Pinned Repositories
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
aikido_wiper
AlpacaDataCleaned
Alpaca dataset from Stanford, cleaned and curated
AMSI-Unchained
Unchain AMSI by patching the provider’s unmonitored memory space
Antivirus-Artifacts
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
arctos-repo-template
attack_to_veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
GcodeCANBus
Converts and streams G code to Can bus
isaac_ros2
Easily setup your ROS2 environment for Isaac Sim and the ROS2 Bridge.
cr0Kz's Repositories
cr0Kz/GcodeCANBus
Converts and streams G code to Can bus
cr0Kz/isaac_ros2
Easily setup your ROS2 environment for Isaac Sim and the ROS2 Bridge.
cr0Kz/adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
cr0Kz/AlpacaDataCleaned
Alpaca dataset from Stanford, cleaned and curated
cr0Kz/arctos-repo-template
cr0Kz/attack_to_veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
cr0Kz/awesome-playbooks
A curated repository of incident response playbooks
cr0Kz/caldera
Automated Adversary Emulation Platform
cr0Kz/CheckHooks-n-load
A Windows stager-cum-PELoader focusing Dynamic EDR Evasion, when Operator wants to Know the the Underlying functions Hooks and then craft Implant based on the previous condition.
cr0Kz/D1rkInject
Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
cr0Kz/data-analysis
A collection of Jupyter Notebooks covering multiple log analysis scenarios.
cr0Kz/decider
A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
cr0Kz/defcon_27_windbg_workshop
DEFCON 27 workshop - Modern Debugging with WinDbg Preview
cr0Kz/EnterprisePurpleTeaming
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
cr0Kz/FastChat
The release repo for "Vicuna: An Open Chatbot Impressing GPT-4"
cr0Kz/Fusion360_ExportIt
This Fusion 360 add-in exports designs in various resolutions, structures and formats within one run.
cr0Kz/haltt4llm
This project is an attempt to create a common metric to test LLM's for progress in eliminating hallucinations which is the most serious current problem in widespread adoption of LLM's for many real purposes.
cr0Kz/MAAD-AF
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Azure AD.
cr0Kz/mks_control
CAN MKS Control for Arctos Robot Arm
cr0Kz/multisocks
A scaling framework for tor relay to load-balance high-throughput tasks 🧦 🧅 ⚖️
cr0Kz/privateGPT
Interact privately with your documents using the power of GPT, 100% privately, no data leaks
cr0Kz/pwnat
The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofing.
cr0Kz/QRExfil
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
cr0Kz/RansomLook
Yet another Ransomware gang tracker
cr0Kz/Real-ESRGAN
Real-ESRGAN aims at developing Practical Algorithms for General Image/Video Restoration.
cr0Kz/serviceDetector
Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin privileges.
cr0Kz/surveyor
A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.
cr0Kz/sysplant
Your syscall factory
cr0Kz/Trawler
PowerShell script to help Incident Responders discover adversary persistence mechanisms.
cr0Kz/Windows_x64_Tcp_Reverse_Shell_Shellcode
Null-free shellcode for TCP reverse shell on Windows x64