jheeree
| Ingeniero en Conectividad y Redes | CEH | NSE4 | eJPT | Autodidacta | CTF Player | Mod/Admin en comunidad L4tin-HTB
/dev/null
Pinned Repositories
apk2url
A tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
APKHunt
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.
AppleJuice
Apple BLE proximity pairing message spoofing
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
clickjacking-check
CVE-2022-1388-checker
Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)
cvss-calc
Simple-CVE-2021-41773-checker
Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)
jheeree's Repositories
jheeree/Simple-CVE-2021-41773-checker
Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)
jheeree/awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
jheeree/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
jheeree/blue-team-wiki
Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries
jheeree/cli
Official Command Line Interface for the IPinfo API (IP geolocation and other types of IP data)
jheeree/CobaltSpam
Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons
jheeree/CVE-2021-1675
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
jheeree/CVE-2021-1676
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
jheeree/DFIRMindMaps
A repository of DFIR-related Mind Maps geared towards the visual learners!
jheeree/GH-Takeover
GH-Takeover — GitHub Pages Sub-domain Takeover Automation!
jheeree/harpoon
CLI tool for open source and threat intelligence
jheeree/HiveNightmare
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
jheeree/instauto
Instagram bot / automation library written in Javascript for Node.js
jheeree/internet-monitoring
Monitor your network and internet speed with Docker & Prometheus
jheeree/Microsoft-Defender-Security-Center-Hunting-Queries
Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview
jheeree/mihari
A framework for continuous OSINT based threat hunting
jheeree/mitre-assistant
A more flexible & useful att&ck client
jheeree/msrc-api
A collection of tools to interact with Microsoft Security Response Center API
jheeree/natlas
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
jheeree/opencti
Open Cyber Threat Intelligence Platform
jheeree/opencve
CVE Alerting Platform
jheeree/OSINT-Search-Tools
Complex OSINT Search Tools 🕵️♂️🔥
jheeree/petereport
PeTeReport is an open-source application vulnerability reporting tool.
jheeree/reconmap
VAPT (vulnerability assessment and penetration testing) automation and reporting platform.
jheeree/RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
jheeree/RoadtoOSCP
Herramientas, máquinas y recursos para enfrentarte al OSCP
jheeree/searchcode-server
The offical home of searchcode-server where you can run searchcode locally. Note that master is generally unstable in the sense that it is not a release. Check releases for release versions https://github.com/boyter/searchcode-server/releases
jheeree/sentinel-attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
jheeree/Sentinel2D3FEND
This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defenses
jheeree/tpotce
🍯 T-Pot - The All In One Honeypot Platform 🐝