daniagung's Stars
CyberSecurityUP/OSCE3-Complete-Guide
OSWE, OSEP, OSED, OSEE
HumanSignal/labelImg
LabelImg is now part of the Label Studio community. The popular image annotation tool created by Tzutalin is no longer actively being developed, but you can check out Label Studio, the open source data labeling tool for images, text, hypertext, audio, video and time-series data.
FSecureLABS/Ninjasploit
A meterpreter extension for applying hooks to avoid windows defender memory scans
med0x2e/SigFlip
SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.
PaloAltoNetworks/autofocus-lenz
A command line utility to aid in using autofocus for IR and research
erocarrera/pefile
pefile is a Python module to read and work with PE (Portable Executable) files
aquasecurity/cloud-security-remediation-guides
Security Remediation Guides
guelfoweb/knock
Knock Subdomain Scan
warhorse/warhorse
Infrastructure Automation
threatexpress/malleable-c2
Cobalt Strike Malleable C2 Design and Reference Guide
icyguider/Shhhloader
Syscall Shellcode Loader (Work in Progress)
CCob/BOF.NET
A .NET Runtime for Cobalt Strike's Beacon Object Files
Flangvik/AzureC2Relay
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.
OpenCTI-Platform/opencti
Open Cyber Threat Intelligence Platform
CodeXTF2/maldev-links
My collection of malware dev links
alexlenail/NN-SVG
Publication-ready NN-architecture schematics.
hasherezade/pe-bear
Portable Executable reversing tool with a friendly GUI
secana/PeNet-Analyzer
Analyzers for Portable Executable anomalies and other malware behavior.
lijiejie/EasyPen
EasyPen is a GUI program which helps pentesters do target discovery, vulnerability scan and exploitation
HKirito/CVE-2022-33980
CVE
microsoft/wil
Windows Implementation Library
huntandhackett/concealed_code_execution
Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows
alufers/mitmproxy2swagger
Automagically reverse-engineer REST APIs via capturing traffic
waawaa/AMSI_Rubeus_bypass
CravateRouge/bloodyAD
BloodyAD is an Active Directory Privilege Escalation Framework
DataDog/stratus-red-team
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
G-Research/siembol
An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced security analytics framework.
last-byte/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
Orange-Cyberdefense/arsenal
Arsenal is just a quick inventory and launcher for hacking programs
Orange-Cyberdefense/GOAD
game of active directory