Pinned Repositories
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
AvastAbuser
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
DEFCON24
FCL
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Malware
Course materials for Malware Analysis by RPISEC
MemoryPatchDetector
Detects code differentials between executables in disk and the corresponding processes/modules in memory
sec-tool-list
More than 16000 security tools, sorted by star count. Both in markdown and json format.
the-book-of-secret-knowledge
:dizzy: A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
theZoo
A repository of LIVE malwares for your own joy and pleasure
chenerlich's Repositories
chenerlich/FCL
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
chenerlich/Malware
Course materials for Malware Analysis by RPISEC
chenerlich/DEFCON24
chenerlich/sec-tool-list
More than 16000 security tools, sorted by star count. Both in markdown and json format.
chenerlich/the-book-of-secret-knowledge
:dizzy: A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
chenerlich/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
chenerlich/AvastAbuser
chenerlich/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
chenerlich/awesome-exploit-development
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
chenerlich/awesome-threat-detection
A curated list of awesome threat detection and hunting resources
chenerlich/BinExp
Linux Binary Exploitation
chenerlich/content
Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated!
chenerlich/CVE-2017-11882
Proof-of-Concept exploits for CVE-2017-11882
chenerlich/DLLSpy
DLL Hijacking Detection Tool
chenerlich/HELK
The Hunting ELK
chenerlich/injectAllTheThings
Seven different DLL injection techniques in one single project.
chenerlich/injection
chenerlich/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
chenerlich/Mobile-SDK-Android
DJI Mobile SDK for Android: http://developer.dji.com/mobile-sdk/
chenerlich/mwcrawler
Python Malware Crawler for Zoos and Repositories
chenerlich/privesc
Process Monitor filter for finding privilege escalation vulnerabilities on Windows
chenerlich/SEC599
SEC599 supporting GitHub repository
chenerlich/Shr3dKit
Red Team Tool Kit
chenerlich/ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
chenerlich/timesketch
Collaborative forensic timeline analysis
chenerlich/Vaccinator
chenerlich/wdt
Warp speed Data Transfer (WDT) is an embeddedable library (and command line tool) aiming to transfer data between 2 systems as fast as possible over multiple TCP paths.
chenerlich/Windows-Hunting
chenerlich/YetiToElastic
YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack
chenerlich/yookiterm-slides
Exploitation and Mitigation Slides