cermmik's Stars
zylon-ai/private-gpt
Interact with your documents using the power of GPT, 100% privately, no data leaks
topjohnwu/Magisk
The Magic Mask for Android
bettercap/bettercap
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
AlessandroZ/LaZagne
Credentials recovery project
SigmaHQ/sigma
Main Sigma Rule Repository
hagezi/dns-blocklists
DNS-Blocklists: For a better internet - keep the internet clean!
ufrisk/MemProcFS
MemProcFS
epinna/weevely3
Weaponized web shell
rabobank-cdc/DeTTECT
Detect Tactics, Techniques & Combat Threats
mattnotmax/cyberchef-recipes
A list of cyber-chef recipes and curated links
center-for-threat-informed-defense/adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
mikeroyal/Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
LetsDefend/SOC-Interview-Questions
SOC Interview Questions
kaonashi-passwords/Kaonashi
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
certsocietegenerale/IRM
Incident Response Methodologies 2022
sepinf-inc/IPED
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners.
fox-it/dissect
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT (part of NCC Group).
infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
cyb3rfox/Aurora-Incident-Response
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
mozillazg/ptcpdump
Process-aware, eBPF-based tcpdump
splunk/attack_data
A repository of curated datasets from various attacks
mitre-attack/bzar
A set of Zeek scripts to detect ATT&CK techniques.
cmu-sei/GHOSTS
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
DFIR-ORC/dfir-orc
Forensics artefact collection tool for systems running Microsoft Windows
corelight/community-id-spec
An open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Cyb3r-Monk/ACCD
Active C&C Detector
markscanlonucd/ChatGPT-for-Digital-Forensics
Errum/IntelArchitectureMap
Intelligence Architecture Mind Map
maddev-engenuity/AdversaryEmulation
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
vojtechkral/bard
Markdown-based songbook compiler.