Pinned Repositories
365Inspect
A PowerShell script that automates the security assessment of Microsoft Office 365 environments.
ADGenerator
Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
Beginner-Network-Pentesting
Notes for Beginner Network Pentesting Course
Buffer-Overflows
Cybersecurity-Debrief-Checklist
This checklist can be used by cybersecurity teams to hone in on the good, the bad, and the ugly of an operation. From a pentest, to an incident response case, from a risk assessment, to a table top scenario, or even more.
Interactive-Cyber-Defense-Matrix
training-resources
joshua17sc's Repositories
joshua17sc/Buffer-Overflows
joshua17sc/training-resources
joshua17sc/Interactive-Cyber-Defense-Matrix
joshua17sc/Cybersecurity-Debrief-Checklist
This checklist can be used by cybersecurity teams to hone in on the good, the bad, and the ugly of an operation. From a pentest, to an incident response case, from a risk assessment, to a table top scenario, or even more.
joshua17sc/365Inspect
A PowerShell script that automates the security assessment of Microsoft Office 365 environments.
joshua17sc/ADGenerator
Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.
joshua17sc/airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
joshua17sc/AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
joshua17sc/blue-team-wiki
Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries
joshua17sc/breach-parse
A tool for parsing breached passwords
joshua17sc/C-cheatsheet
A MEMORY DUMP OF C PROGRAMMING, by Sean Eyre (@oni49) and Stephen Semmelroth (@stephensemmelroth / @diodepack) of Rainier Cyber. This document is intended to provide you a quick desk reference for C’s syntax and semantics. We included several example programs that will elaborate on each section in greater detail.
joshua17sc/C-labs
For all of my C practice
joshua17sc/chinguproject
joshua17sc/cisspexamcram
joshua17sc/concierge
Repo for Concierge AI dev work
joshua17sc/GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
joshua17sc/h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
joshua17sc/ICS-Security-Study-Resources
A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.
joshua17sc/intruder
CLI web form fuzzer
joshua17sc/IRM
Incident Response Methodologies 2022
joshua17sc/joshua17sc.github.io
joshua17sc/osx-re-101
A collection of resources for OSX/iOS reverse engineering.
joshua17sc/OWASP-ASVS-4.0-testing-guide
joshua17sc/proftpd-1.3.5-reverse-shell-exploit
joshua17sc/securecontrolsframework
joshua17sc/showmethemoney
These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and the executives/business owners.
joshua17sc/TRIBUTE
This is a writeup/walkthrough for the TryHackMe room "Tribute" by Joshua17sc
joshua17sc/vCISO-Tools
Some of the tools we use during vCISO engagements
joshua17sc/windows-security-checklist
joshua17sc/Zombieroom