Pinned Repositories
ABD
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
ApplicationInspector
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'what's in it' using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
at-ps
Adversary Tactics - PowerShell Training
demo_app
Ruby on Rails Tutorial demo application
first_app
rails tutorial
odvijak
Simple app for paraglide drag
reversinglabs-yara-rules
ReversingLabs YARA Rules
sample_app
cias's Repositories
cias/reversinglabs-yara-rules
ReversingLabs YARA Rules
cias/ABD
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
cias/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
cias/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
cias/ApplicationInspector
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'what's in it' using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
cias/at-ps
Adversary Tactics - PowerShell Training
cias/atc-react
A knowledge base of actionable Incident Response techniques
cias/attack-arsenal
A collection of red team and adversary emulation resources developed and released by MITRE.
cias/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
cias/awesome-incident-response
A curated list of tools for incident response
cias/cias.github.io
cias/CobaltStrike
CobaltStrike's source code
cias/CyberThreatHunting
A collection of resources for Threat Hunters
cias/DefendTheFlag
Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test out Microsoft's security products.
cias/dirsearch
Web path scanner
cias/example-01-helloworld
Hello world for angularjs
cias/Infosec_Reference
An Information Security Reference That Doesn't Suck
cias/ircapabilities
Incident Response Hierarchy of Needs
cias/malware-samples
Malware samples, analysis exercises and other interesting resources.
cias/malwoverview
Malwoverview is a first response tool to perform an initial and quick triage in a directory containing malware samples, specific malware sample, suspect URL and domains. Additionally, it allows to download and send samples to main online sandboxes.
cias/mmbot
Market Making trading bot for cryptomarkets
cias/nmapAutomator
A script that you can run in the background!
cias/Pentesting-Guide
cias/SysmonCommunityGuide
TrustedSec Sysinternals Sysmon Community Guide
cias/ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
cias/TL-BOTS
A collection of source code for various botnets.
cias/velociraptor
Digging Deeper....
cias/velociraptor-docs
Documentation site for Velociraptor
cias/WinPmem
The multi-platform memory acquisition tool.
cias/zimbohack