randomaccess3's Stars
prowler-cloud/prowler
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
tstack/lnav
Log file navigator
Pennyw0rth/NetExec
The Network Execution Tool
elastic/detection-rules
dafthack/GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
Kudaes/Elevator
UAC bypass by abusing RPC and debug objects.
Bert-JanP/Incident-Response-Powershell
PowerShell Digital Forensics & Incident Response Scripts.
evild3ad/Microsoft-Analyzer-Suite
A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID
InfoSecInnovations/concierge
Repo for Concierge AI dev work
xorhex/mlget
A golang CLI tool to download malware from a variety of sources.
CesarAyalaDev/RAASNet
AmgdGocha/DriveFS-Sleuth
DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based on research that has been performed by mounting different scenarios and noting down the changes in the Google Drive File Stream disk artifacts.
nathanmcnulty/nathanmcnulty
mdawsonuk/LevelDBDumper
Dumps all of the Key/Value pairs from a LevelDB database
svch0stz/TheThreatHuntLibrary
Library of threat hunts to get any user started!
JSCU-NL/COATHANGER
IOCs and detection script for COATHANGER malware
andpalmier/seads
Search Engines ADs scanner - spotting malvertising in search engines has never been easier!
stephenjudge/TCHunt
Quickly find encrypted files and files made-up of random data
rapid7/Rapid7-Labs
Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence, research and analytics.
microsoft/MSEntraIDProtectionGuidance
MS Entra ID Protection Guidance
RandomRhythm/mal2csv
Malformed Access Log to CSV - Convert Web Server Access Logs to CSV
truekonrads/ocspcryptneturlcache
How to extract subject names from OCSP responses cached in Windows leveraging crt.sh
SecurityNik/CTF
Cyber Security CTF Challenges
joeavanzato/velociraptor-timeline-creator
VTC - Velociraptor Timeline Creator
certat/citrix-logchecker
Parse citrix netscaler logs to check for signs of CVE-2023-4966 exploitation
DissectMalware/yaradbg-container
A docker config file to run yaradbg in a container
vividDuck/wiskess_rust
WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.
esThreatIntelligence/GootLoader
kaiiyer/okta-threat-hunting
Notebook from my "Guardians of Identity: OKTA’s Underworld" talk at Jupyterthon
Digital-Thought/dtPyAppFramework
Welcome to dtPyAppFramework. A Python library for common features in application development.