jb295's Stars
uber-common/metta
An information security preparedness tool to do adversarial simulation.
AlessandroZ/LaZagne
Credentials recovery project
mubix/post-exploitation
Post Exploitation Collection
xchwarze/Cain
Password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks and more!
alex-sector/dns2tcp
glmcdona/Process-Dump
Windows tool for dumping malware PE files from memory back to disk for analysis.
quarkslab/quarkspwdump
Dump various types of Windows credentials without injecting in any process.
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
OTRF/ThreatHunter-Playbook
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Fuzion24/vUSBf
thelumberjhack/vUSBf
nccgroup/FrisbeeLite
A GUI-based USB device fuzzer
stefanesser/dumpdecrypted
Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.
adafruit/Kinect
Kinect hacking!
schumilo/vUSBf
lifting-bits/grr
High-throughput fuzzer and emulator of DECREE binaries
longld/peda
PEDA - Python Exploit Development Assistance for GDB
Invoke-IR/Presentations
rmusser01/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
SpecterOps/BloodHound-Legacy
Six Degrees of Domain Admin
EmpireProject/EmPyre
A post-exploitation OS X/Linux agent written in Python 2.7
PowerShellEmpire/PowerTools
PowerTools is a collection of PowerShell projects with a focus on offensive operations.
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent.
ThreatHuntingProject/ThreatHunting
An informational repo about hunting for adversaries in your IT environment.
Bretley/how2exploit_binary
An in depth tutorial on how to do binary exploitation
nsacyber/WALKOFF
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
meirwah/awesome-incident-response
A curated list of tools for incident response
phantomcyber/playbooks
Phantom Community Playbooks
foospidy/HoneyPy
A low to medium interaction honeypot.
Invoke-IR/PowerForensics
PowerForensics provides an all in one platform for live disk forensic analysis