klsec's Stars
glassechidna/actions2aws
Assume AWS IAM roles from GitHub Actions workflows with no stored secrets
XMCyber/MacHound
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
redcanaryco/cb-event-forwarder
Subscribe to raw Carbon Black event feed and forward to another system, such as Splunk, etc.
jxy-s/herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
jdu2600/Windows10EtwEvents
Events from all manifest-based and mof-based ETW providers across Windows 10 versions
leechristensen/RequestAADRefreshToken
ropnop/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
jcmturner/gokrb5
Pure Go Kerberos library for clients and services
trustedsec/CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
olafhartong/ATTACKdatamap
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
rvrsh3ll/BOF_Collection
Various Cobalt Strike BOFs
elyase/awesome-gpt3
RhinoSecurityLabs/Cloud-Security-Research
Cloud-related research releases from the Rhino Security Labs team.
ropnop/kerberos_windows_scripts
Collection of scripts for interacting with AD Kerberos from Linux
sa7mon/S3Scanner
Scan for misconfigured S3 buckets across S3-compatible APIs!