nprigent's Stars
adam-p/markdown-here
Google Chrome, Firefox, and Thunderbird extension that lets you write email in Markdown and render it before sending.
spf13/viper
Go configuration with fangs
crystal-lang/crystal
The Crystal Programming Language
mvt-project/mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
BloodHoundAD/BloodHound
Six Degrees of Domain Admin
FreshRSS/FreshRSS
A free, self-hostable news aggregator…
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
ampache/ampache
A web based audio/video streaming application and file manager allowing you to access your music & videos from anywhere, using almost any internet enabled device.
olafhartong/sysmon-modular
A repository of sysmon configuration modules
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
hasherezade/malware_training_vol1
Materials for Windows Malware Analysis training (volume 1)
m0nad/Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
504ensicsLabs/LiME
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.
Shuffle/Shuffle
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
davehull/Kansa
A Powershell incident response framework
cyb3rfox/Aurora-Incident-Response
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
atc-project/atc-react
A knowledge base of actionable Incident Response techniques
CIRCL/Circlean
USB key cleaner
volatilityfoundation/profiles
Volatility profiles for Linux and Mac OS X
chip-red-pill/glm-ucode
GLM uCode dumps
bcle/fuse4js
FUSE bindings for Javascript and node.js
TheHive-Project/CortexDocs
Documentation of Cortex
kd8bny/LiMEaide
A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host.
fox-it/dissect.cobaltstrike
Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles
synacktiv/rulesfinder
Machine-learn password mangling rules
bi-zone/Log4j_Detector
Detection of Log4j in memory
kslgroup/threadmap
threadmap plugin for Volatility Foundation
padfoot999/sysmon-config
https://github.com/Swiftonsecurity/sysmon-config
xme/yara-rules
Repository of own YARA rules
monsoft/iphrestore
Restore pictures and videos from iPhone backup