Pinned Repositories
A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
awesome-cyber-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
cybersecurity-team.github.io
This will be the main repository.
linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
maltrail
Malicious traffic detection system
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
threat-dragon
An open source, online threat modelling tool from OWASP
turbinia
Automation and Scaling of Digital Forensics Tools
Cybersecurity Team's Repositories
cybersecurity-team/cybersecurity-team.github.io
This will be the main repository.
cybersecurity-team/awesome-cyber-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
cybersecurity-team/linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
cybersecurity-team/maltrail
Malicious traffic detection system
cybersecurity-team/RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
cybersecurity-team/threat-dragon
An open source, online threat modelling tool from OWASP
cybersecurity-team/awesome-appsec
A curated list of resources for learning about application security
cybersecurity-team/awesome-detection-rules
This is a collection of threat detection rules / rules engines that I have come across.
cybersecurity-team/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
cybersecurity-team/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected.
cybersecurity-team/community-threats
A place to share attack chains for testing people, process, and technology with the entire community. The largest, public library of adversary emulation and adversary simulation plans! #ThreatThursday
cybersecurity-team/cvelist
Pilot program for CVE submission through GitHub
cybersecurity-team/CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
cybersecurity-team/Detection-Rule-Dump
This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.
cybersecurity-team/detection-rules
Rules for Elastic Security's detection engine
cybersecurity-team/detection-rules-1
Rules for Elastic Security's detection engine
cybersecurity-team/EnterprisePurpleTeaming
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
cybersecurity-team/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
cybersecurity-team/flightsim
A utility to safely generate malicious network traffic patterns and evaluate controls.
cybersecurity-team/hblock
Improve your security and privacy by blocking ads, tracking and malware domains.
cybersecurity-team/Hunting-Queries-Detection-Rules
Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
cybersecurity-team/panther-analysis
Built-in Panther detection rules and policies
cybersecurity-team/PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
cybersecurity-team/rengine
reNgine is a reconnaissance engine(framework) that does end-to-end reconnaissance with the help of highly configurable scan engines and does information gathering about the target web application. reNgine makes use of various open-source tools and makes a configurable pipeline of reconnaissance.
cybersecurity-team/Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
cybersecurity-team/showmethemoney
These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and the executives/business owners.
cybersecurity-team/SIEM
SIEM Tactics, Techiques, and Procedures
cybersecurity-team/sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
cybersecurity-team/SniperPhish
SniperPhish - The Web-Email Spear Phishing Toolkit
cybersecurity-team/vapi
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.