orenelim's Stars
Veil-Framework/Veil
Veil 3.1.X (Check version info in Veil at runtime)
fatedier/frp
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
claroty/arya
Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.
ukncsc/SME
MicrosoftDocs/windowsserverdocs
Public content repository for Windows Server content.
0vercl0k/CVE-2022-21971
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
Res260/conti_202202_leak_procedures
This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in the leak and posted on may 10th, 2021 in the channel.
TalEliyahu/awesome-security-newsletters
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
blst-security/cherrybomb
Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by auditing your API specifications, validating them and running API security tests.
tstillz/webshell-scan
Simple web shell scanner written in Golang.
tennc/webshell
This is a webshell open source project
morphuslabs/get-log4j-exploit-payload
Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Yamato-Security/hayabusa-sample-evtx
Sample evtx files to use for testing hayabusa detection rules
microsoft/msticpy
Microsoft Threat Intelligence Security Tools
woodpecker-appstore/log4j-payload-generator
Log4j jndi injects the Payload generator
philhagen/sof-elk
Configuration files for the SOF-ELK VM
CanIPhish/Phishious
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
kevoreilly/CAPEv2
Malware Configuration And Payload Extraction
3CORESec/S2AN
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
certsocietegenerale/IRM-deprecated
Incident Response Methodologies
stuhli/awesome-event-ids
Collection of Event ID ressources useful for Digital Forensics and Incident Response
MISP/misp-training
MISP trainings, threat intel and information sharing training materials with source code
NeuraLegion/brokencrystals
A Broken Application - Very Vulnerable!
brakmic/Sinkholes
:bug: Malware Sinkhole List in various formats
stamparm/ipsum
Daily feed of bad IPs (with blacklist hit scores)
Neo23x0/signature-base
YARA signature and IOC database for my scanners and tools
bridgecrewio/checkov
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
stelligent/cfn_nag
Linting tool for CloudFormation templates
JavierOlmedo/OWASP-Calculator
🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment