hafenschiffer's Stars
owasp-amass/amass
In-depth attack surface mapping and asset discovery
mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
BishopFox/unredacter
Never ever ever use pixelation as a redaction technique
clong/DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
RhinoSecurityLabs/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
blocklistproject/Lists
Primary Block Lists
deepfence/SecretScanner
:unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock:
WithSecureLabs/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
dafthack/CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
netwrix/pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
hasherezade/malware_training_vol1
Materials for Windows Malware Analysis training (volume 1)
microsoft/Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
OTRF/Security-Datasets
Re-play Security Events
cisagov/cset
Cybersecurity Evaluation Tool
splunk/security_content
Splunk Security Content
MichaelKoczwara/Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
google/vsaq
VSAQ is an interactive questionnaire application to assess the security programs of third parties.
mvelazc0/PurpleSharp
PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
Cyb3r-Monk/Threat-Hunting-and-Detection
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
Accenture/jenkins-attack-framework
olafhartong/sysmon-cheatsheet
All sysmon event types and their fields explained
timdorr/spotifeed
A simple service to serve up Spotify podcasts as RSS feeds for use in any podcast app.
scipag/password-list
Password lists with top passwords to optimize bruteforce attacks
JSCU-NL/logging-essentials
A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.
n0x08/ShodanTools
Collection of scripts & fingerprinting tricks for Shodan.io
projectdiscovery/pd-actions
Continuous recon and vulnerability assessment using Github Actions.
ashwin-patil/blue-teaming-with-kql
Repository with Sample KQL Query examples for Threat Hunting
Azure/CONVEX
CONVEX is a group of CTFs that are independently deployable into participant Azure environments.
nccgroup/KilledProcessCanary
A canary designed to minimize the impact from certain Ransomware actors
FirmGuardian/backdoors-and-breaches-pcio
A port of BHIS's Backdoors & Breaches for playingcards.io