lore-masc's Stars
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
fastfire/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
CyberMonitor/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOC
Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
worawit/MS17-010
MS17-010
S3cur3Th1sSh1t/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
CYB3RMX/Qu1cksc0pe
All-in-One malware analysis tool.
wbenny/injdrv
proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC
demisto/content
Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated!
wwh1004/ExtremeDumper
.NET Assembly Dumper
tclahr/uac
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Yamato-Security/WELA
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
hfiref0x/DSEFix
Windows x64 Driver Signature Enforcement Overrider
bluecapesecurity/PWF
Practical Windows Forensics Training
felixweyne/imaginaryC2
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
MBCProject/mbc-markdown
MBC content in markdown
api0cradle/CVE-2023-23397-POC-Powershell
CrowdStrike/SuperMem
A python script developed to process Windows memory images based on triage type.
gtworek/VolatileDataCollector
nazywam/AutoIt-Ripper
Extract AutoIt scripts embedded in PE binaries
JMousqueton/PoC-CVE-2022-30190
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
bk-cs/rtr
Real-time Response scripts and schema
irql/CVE-2021-31728
vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.
pr0tean/TelemetrySourcerer-patched
Tiny driver patch to allow kernel callbacks to work on Win10 21h1
zeze-zeze/CYBERSEC2023-BYOVD-Demo
nbicocchi/learn-bash
Basic course introducing installation, maintenance, and automation of modern Unix systems. Recommended to learners without previous experience.
Ja7ad/PHP-Malware-Scanner
PHP Malware Scanner
ruggi99/PurpleExercise
Microv/AstarothConfigExtractor