Pinned Repositories
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active-Directory-Wordlists
Active Directory Wordlists
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
DeTTECT
Detect Tactics, Techniques & Combat Threats
Elemental
Elemental - An ATT&CK Threat Library
lsassy
Extract credentials from lsass remotely
Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
OffensiveVBA
This repo covers some code execution and AV Evasion methods for Macros in Office documents
PowerShellForPentesters
Course repository for PowerShell for Pentesters Course
Rubeus
Trying to tame the three-headed dog.
br3ach3r-fff's Repositories
br3ach3r-fff/Elemental
Elemental - An ATT&CK Threat Library
br3ach3r-fff/PowerShellForPentesters
Course repository for PowerShell for Pentesters Course
br3ach3r-fff/Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
br3ach3r-fff/DeTTECT
Detect Tactics, Techniques & Combat Threats
br3ach3r-fff/lsassy
Extract credentials from lsass remotely
br3ach3r-fff/Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
br3ach3r-fff/OffensiveVBA
This repo covers some code execution and AV Evasion methods for Macros in Office documents
br3ach3r-fff/Rubeus
Trying to tame the three-headed dog.
br3ach3r-fff/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
br3ach3r-fff/adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
br3ach3r-fff/APTSimulator
A toolset to make a system look as if it was the victim of an APT attack
br3ach3r-fff/attack-arsenal
A collection of red team and adversary emulation resources developed and released by MITRE.
br3ach3r-fff/awesome-threat-detection
A curated list of awesome threat detection and hunting resources
br3ach3r-fff/Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
br3ach3r-fff/Cobalt-Wipe
Cobalt wipe is the non-commercial version of Cobalt-Strike 4.3 (May 2021 Release)
br3ach3r-fff/CRTO
Certified Red Team Operator
br3ach3r-fff/Development-Projects
br3ach3r-fff/gsocket
Connect like there is no firewall. Securely.
br3ach3r-fff/hyperdrive
C2-Framework
br3ach3r-fff/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
br3ach3r-fff/linux-exploit-suggester
Linux privilege escalation auditing tool
br3ach3r-fff/Logstash
Contains Logstash related content including tons of Logstash configurations
br3ach3r-fff/maldev-for-dummies
A workshop about Malware Development
br3ach3r-fff/PythonDataScienceHandbook
Python Data Science Handbook: full text in Jupyter Notebooks
br3ach3r-fff/rita
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
br3ach3r-fff/SharpSploit
SharpSploit is a .NET post-exploitation library written in C#
br3ach3r-fff/sigma
Generic Signature Format for SIEM Systems
br3ach3r-fff/sshuttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
br3ach3r-fff/sysmon-config
Sysmon configuration file template with default high-quality event tracing
br3ach3r-fff/wfuzz
Web application fuzzer