Pinned Repositories
aad-sso-enum-brute-spray
POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
Alaris
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
Amsi-Killer
Lifetime AMSI bypass
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
auditd-attack
A Linux Auditd rule set mapped to MITRE's Attack Framework
awesome-hacker-search-engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
azure-cdn-ips
List of Azure CDN IP Addresses
Azure-Red-Team
Azure Security Resources and Notes
secAnalyst's Repositories
secAnalyst/VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
secAnalyst/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
secAnalyst/AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
secAnalyst/Ivy
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
secAnalyst/MailSniper
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an administrator to search the mailboxes of every user in a domain.
secAnalyst/redteamwiki
secAnalyst/Alaris
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
secAnalyst/azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
secAnalyst/aad-sso-enum-brute-spray
POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln
secAnalyst/TitanLdr
Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH
secAnalyst/TokenTactics
Azure JWT Token Manipulation Toolset
secAnalyst/DefenderCheck
Identifies the bytes that Microsoft Defender flags on.
secAnalyst/Payload-Download-Cradles
Different Payload Download Cradles to download your hosted Payload to bypass AV/EPP/EDR and open a stable C2 Channel
secAnalyst/FindFrontableDomains
Search for potential frontable domains
secAnalyst/fireprox
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
secAnalyst/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
secAnalyst/sunburst_countermeasures
secAnalyst/PhishingFromMS365API
A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts
secAnalyst/auditd-attack
A Linux Auditd rule set mapped to MITRE's Attack Framework
secAnalyst/the-practical-linux-hardening-guide
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
secAnalyst/DueDLLigence
secAnalyst/Jamf-Nation-Extension-Attributes
secAnalyst/splunk-hunting-helpers
secAnalyst/minerchk
Bash script to Check for malicious Cryptomining