dmoore44's Stars
thehappydinoa/awesome-censys-queries
A collection of fascinating and bizarre Censys Search Queries
jakejarvis/awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
unknownhad/CloudIntel
This repo contains IOC, malware and malware analysis associated with Public cloud
dfir-iris/iris-web
Collaborative Incident Response platform
vesoapp/veso
Open source media server.
securecontrolsframework/securecontrolsframework
Config files for my GitHub profile.
pbatard/rufus
The Reliable USB Formatting Utility
OTRF/infosec-jupyterthon
A community event for security researchers to share their favorite notebooks
StrangerealIntel/DailyIOC
IOC from articles, tweets for archives
ancailliau/sans-indexes
Indexes for SANS Courses and GIAC Certifications
geekscrapy/misp-batchobjects
Import MISP objects via CSV
Ben0xA/PowerShellDefense
Some PowerShell Defensive Scripts
Hive-Systems/pyfair
Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems
splunk/security_content
Splunk Security Content
arnv0/bofman
tool to assist in research and development of simple buffer overflow attacks
thomfre/OSCP-Exam-Report-Template
OSCP Exam Report Template in Markdown
mgreen27/Invoke-LiveResponse
Invoke-LiveResponse
remembercds/OSCP-Exercises-Check-List
A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.
Neo23x0/vti-dorks
Awesome VirusTotal Intelligence Search Queries
n8n-io/n8n
Free and source-available fair-code licensed workflow automation tool. Easily automate tasks across different services.
MISP/misp-objects
Definition, description and relationship types of MISP objects
Tera0017/TAFOF-Unpacker
TA505 unpacker Python 2.7
byt3bl33d3r/Red-Baron
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams
WithSecureLabs/physmem2profit
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
xFreed0m/Disruption
Terraform script to deploy AD-based environment on Azure
NCSC-NL/taranis3
Taranis
0xtf/nsm-attack
Mapping NSM rules to MITRE ATT&CK
kevthehermit/RATDecoders
Python Decoders for Common Remote Access Trojans
emilyanncr/Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Cn33liz/p0wnedShell
PowerShell Runspace Post Exploitation Toolkit