bluescreenofwin
Windows Hacker, Cybersecurity Trainer, Giver of Talks, WRCCDC Infrastructure Lead, Security Engineer. I work on security competitions sometimes
bluescreenofwin's Stars
iptables-viz/iptables-viz
A simple and scalable iptables visualisation tool which can integrate across Kubernetes and Linux.
socfortress/CoPilot
SOCFortress CoPilot
correlatedsecurity/Awesome-SOAR
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
Telmate/terraform-provider-proxmox
Terraform provider plugin for proxmox
cmu-sei/GHOSTS
GHOSTS is a realistic user simulation framework for cyber simulation, training, and exercise
rewanthtammana/Damn-Vulnerable-Bank
Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
certsocietegenerale/IRM
Incident Response Methodologies 2022
GoSecure/pyrdp
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
lorentzenman/sheepl
Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments
SygniaLabs/BackupKeyManager
fr34kyn01535/discord-fs
Concept: Unlimited file storage using attachments in Discord chat rooms
forscht/ddrive
Discord as a filesystem.
algolia/sup3rS3cretMes5age
Simple to use, simple to deploy, one time self destruct messaging service, with hashicorp vault as a backend
starship/starship
☄🌌️ The minimal, blazing-fast, and infinitely customizable prompt for any shell!
TalEliyahu/Threat_Model_Examples
Collection of Threat Models
punk-security/smbeagle
SMBeagle - Fileshare auditing tool.
lgandx/PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
fin3ss3g0d/evilgophish
evilginx3 + gophish
safebuffer/vulnerable-AD
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
scipag/HardeningKitty
HardeningKitty - Checks and hardens your Windows configuration
WithSecureLabs/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
stuhli/awesome-event-ids
Collection of Event ID ressources useful for Digital Forensics and Incident Response
cider-security-research/cicd-goat
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
potatoqualitee/kbupdate
🛡 KB Viewer, Saver, Installer and Uninstaller
microsoft/SecCon-Framework
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.
Flangvik/TeamFiltration
TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts
nzymedefense/nzyme
Network Defense System.
EvotecIT/ADEssentials
PowerShell Active Directory helper functions to manage healthy Active Directory
last-byte/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte