litwtch's Stars
xpn/sccmwtf
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
lozaning/HomeAssistantPoliceDetector
Scans for BLE devices and if it see any from Taser International sets an home assistant switch to 'on', turns back off a minute after the device is gone
y-x-c/wearable-microphone-jamming
Repository for our paper Wearable Microphone Jamming
aquia-inc/aws-guardduty-runbook-generator
Generates runbooks for GuardDuty findings
N0rz3/Eyes
🕵️ Email osint tool
joeycastillo/The-Open-Book
abhijithb200/investigator
An online handy-recon tool
k-bailey/detection-engineering-maturity-matrix
SeanDaBlack/AbBOT
Te-k/harpoon
CLI tool for open source and threat intelligence
BeetleChunks/SpoolSploit
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
OTRF/OSSEM
Open Source Security Events Metadata (OSSEM)
posquit0/Awesome-CV
:page_facing_up: Awesome CV is LaTeX template for your outstanding job application
pseudo-security/slacksecrets
Scans Slack for API tokens, credentials, passwords, and more using YARA rules
ralphte/build_a_phish
Ansible playbook to deploy a phishing engagement in the cloud.
github/site-policy
Collaborative development on GitHub's site policies, procedures, and guidelines
thinkst/canarytokens
Canarytokens helps track activity and actions on your network.
TheShiShiLion/BackdoorsAndBreaches
Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security
Neo23x0/Raccine
A Simple Ransomware Vaccine
RedSiege/EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
alex/what-happens-when
An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"
sbousseaden/Slides
Misc Threat Hunting Resources
deadbits/Analyst-CaseFile
Maltego CaseFile entities for information security investigations, malware analysis and incident response
splunk/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
OTRF/Security-Datasets
Re-play Security Events
DefensiveOrigins/AtomicPurpleTeam
Atomic Purple Team Framework and Lifecycle
clr2of8/SlackExtract
A PowerShell script to download all files, messages and user profiles that a user has access to in slack.
clr2of8/DPAT
Domain Password Audit Tool for Pentesters
mattnotmax/cyberchef-recipes
A list of cyber-chef recipes and curated links