Pinned Repositories
0day-security-software-vulnerability-analysis-technology
0day安全_软件漏洞分析技术
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
adwt
Anonymous Dark Web Tool
AH2021Workshop
Malware development for red teaming workshop
AI-900KO-Microsoft-Azure-AI-Fundamentals
Microsoft Azure AI 기본 사항 연습
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
AllThingsAndroid
A Collection of Android Pentest Learning Materials
AllVideoPocsFromHackerOne
This script grab public report from hacker one and make some folders with poc videos
AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
devkw's Repositories
devkw/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
devkw/awesome-canbus
:articulated_lorry: Awesome CAN bus tools, hardware and resources for Cyber Security Researchers, Reverse Engineers, and Automotive Electronics Enthusiasts.
devkw/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
devkw/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
devkw/Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
devkw/awesome-incident-response
A curated list of tools for incident response
devkw/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
devkw/Awesome-RCE-techniques
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
devkw/awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
devkw/awesome-vehicle-security
🚗 A curated list of resources for learning about vehicle security and car hacking.
devkw/AWSGoat
AWSGoat : A Damn Vulnerable AWS Infrastructure
devkw/BloodHound
Six Degrees of Domain Admin
devkw/Custom-Assessment-and-Remediation-Script-Library
devkw/exploitdb
The official Exploit Database repository
devkw/exploitdb-bin-sploits
Exploit Database binary exploits located in the /sploits directory
devkw/Fuzzing_book
Fuzzing book의 내용을 번역하고, 실습해본 리포지토리
devkw/h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
devkw/IoTSecurity101
A Curated list of IoT Security Resources
devkw/osce-note
OSCE Note
devkw/OSCP-Exam-Report-Template-Markdown
OSCP Exam Report Template in Markdown
devkw/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
devkw/PoC
Proofs-of-concept
devkw/poc-1
Proof of Concepts
devkw/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
devkw/prowler
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 240 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
devkw/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
devkw/shellcode-1
Shellcodes for Windows/Linux/BSD running on x86, AMD64, ARM, ARM64
devkw/Threat-Hunting-With-Splunk
Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise
devkw/Veil-Evasion
Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions
devkw/workflows-templates
workflows-templates