patelhridaya's Stars
Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
nshalabi/SysmonTools
Utilities for Sysmon
fireeye/HXTool
HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physical workstation. HXTool provides additional features and capabilities over the standard FireEye HX web user interface. HXTool uses the fully documented REST API that comes with the FireEye HX for communication with the HX environment.
mvt-project/mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
learntocloud/learn-to-cloud
Learn the fundamentals of cloud computing
ffuf/ffuf
Fast web fuzzer written in Go
fireeye/BitsParser
Velocidex/velociraptor
Digging Deeper....
infosecn1nja/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
byt3bl33d3r/CrackMapExec
A swiss army knife for pentesting networks
mandiant/Mandiant-Azure-AD-Investigator
adbertram/Random-PowerShell-Work
Random PowerShell Work
WiredPulse/PoSh-R2
PowerShell - Rapid Response... For the incident responder in you!
reversinglabs/reversinglabs-yara-rules
ReversingLabs YARA Rules
davehull/Kansa
A Powershell incident response framework
vysecurity/ANGRYPUPPY
Bloodhound Attack Path Automation in CobaltStrike
microsoft/avml
AVML - Acquire Volatile Memory for Linux
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
FuzzySecurity/PowerShell-Suite
My musings with PowerShell
wekan/wekan
The Open Source kanban (built with Meteor). Keep variable/table/field names camelCase. For translations, only add Pull Request changes to wekan/i18n/en.i18n.json , other translations are done at https://app.transifex.com/wekan/wekan only.
R3MRUM/PSDecode
PowerShell script for deobfuscating encoded PowerShell scripts
bats3c/shad0w
A post exploitation framework designed to operate covertly on heavily monitored environments
scottymcraig/CEHv10StudyGuide
Study Guide for the CEH v10
Neo23x0/Fnord
Pattern Extractor for Obfuscated Code
Neo23x0/signature-base
YARA signature and IOC database for my scanners and tools
rowingdude/analyzeMFT
analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem and present the results as accurately as possible in multiple formats.
ibmresilient/resilient-community-apps
Source code for IBM SOAR Apps that are available on our App Exchange
praetorian-inc/purple-team-attack-automation
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
dagonis/obscureV4
Let's obscure some IPv4 addresses
SecurityNik/pktIntel
Tool used to perform threat intelligence against packet data