ghoststeve's Stars
vxunderground/MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
0xJs/RedTeaming_CheatSheet
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
t3l3machus/Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
purpl3f0xsecur1ty/useful_random_stuff
Just some things that have some cool uses
SamirPaulb/DSAlgo
📚A repository that contains all the Data Structures and Algorithms concepts and solutions to various problems in Python3 stored in a structured manner.👨💻🎯
obheda12/GitDorker
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
trufflesecurity/trufflehog
Find, verify, and analyze leaked credentials
fox-it/dissect
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT (part of NCC Group).
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
wortell/AZSentinel
PowerShell module for Azure Sentinel
shreyaschavhan/oscp-pre-preparation-plan-and-notes
My OSCP Pre-Preparation Phase. I'm not sure if I'll be able to afford the exam but what count's trying and learning things. I'm gonna give it a try. [Start Date: 21st March 2022]
edoardottt/eJPT-notes
Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)
21y4d/nmapAutomator
A script that you can run in the background!
parag-metron/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
last-byte/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
elastic/protections-artifacts
Elastic Security detection content for Endpoint
ipinfo/cli
Official Command Line Interface for the IPinfo API (IP geolocation and other types of IP data)
rod-trent/MustLearnKQL
Code included as part of the MustLearnKQL blog series
RoseSecurity/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus software when creating backdoors!
sottlmarek/DevSecOps
Ultimate DevSecOps library
tsrob50/LogAnalyticsAPIFunction
Writes Hashtable data to a Log Analytics workspace
onceupon/Bash-Oneliner
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
jwasham/coding-interview-university
A complete computer science study plan to become a software engineer.
curated-intel/Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
NextronSystems/APTSimulator
A toolset to make a system look as if it was the victim of an APT attack
jakejarvis/awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
trickest/cve
Gather and update all available and newest CVEs with their PoC.
krol3/container-security-checklist
Checklist for container security - devsecops practices
s0md3v/be-a-hacker
roadmap for a self-taught hacker
cyberphor/Soap
A PowerShell module for incident response and threat hunting.