irq8's Stars
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SigmaHQ/sigma
Main Sigma Rule Repository
SecWiki/windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
bluscreenofjeff/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
OTRF/ThreatHunter-Playbook
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
CyberMonitor/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
ivre/ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.
Ignitetechnologies/Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
EntySec/Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
sbousseaden/EVTX-ATTACK-SAMPLES
Windows Events Attack Samples
ctfs/resources
A general collection of information, tools, and tips regarding CTFs and similar security competitions
center-for-threat-informed-defense/adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
D4Vinci/Dr0p1t-Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
redhuntlabs/RedHunt-OS
Virtual Machine for Adversary Emulation and Threat Hunting
GhostPack/SafetyKatz
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader
codingo/Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
hubert3/iSniff-GPS
Passive sniffing tool for capturing and visualising WiFi location data disclosed by iOS devices
RedDrip7/APT_Digital_Weapon
Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
AndrewRathbun/DFIRMindMaps
A repository of DFIR-related Mind Maps geared towards the visual learners!
rsmudge/cortana-scripts
A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Strike 3.x. Cobalt Strike 3.x uses a variant of Cortana called Aggressor Script.
thewhiteh4t/flashsploit
Exploitation Framework for ATtiny85 Based HID Attacks
silence-is-best/c2db
c2 traffic
ecstatic-nobel/pOSINT
Gather Open-Source Intelligence using PowerShell.
NationalSecurityAgency/fractalrabbit
Simulate realistic trajectory data seen through sporadic reporting
daddycocoaman/BeaconGraph
Graph visualization of wireless client and access point relationships
silence-is-best/files
HarmJ0y/cortana
This is a pack of Cortana scripts commonly used on our pentests.
lasq88/deobfuscate
Python script to automatically deobfuscate malware code
blackhatethicalhacking/CloudFail
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network