strykrxyz's Stars
coolacid/docker-misp
A (nearly) production ready Dockered MISP
BananaHolograma/ipharvest
ipharvest is a command-line tool that extracts IP addresses from various data sources and generates reports in multiple formats, such as CSV and JSON.
opsworks-co/vector-eks-s3-opensearch
This Terraform module simplify setup of the logging collecting and aggregation using Vector to the AWS EKS with intermediate cache in AWS S3 and final destination in AWS OpenSearch
vectordotdev/vector
A high-performance observability data pipeline.
zeek/zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
zeek/zeek-docker
Docker files for building Zeek.
OISF/suricata
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
VirusTotal/yara
The pattern matching swiss knife
MISP/misp-training
MISP trainings, threat intel and information sharing training materials with source code
MISP/MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
im-hanzou/MSAPer
Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)
MicroTrendsLtd/NinjaTrader8
NinjaTrader8 Components Strategies and Trading tools
mantvydasb/RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
OWASP/www-project-top-ten
OWASP Foundation Web Respository
thewhiteh4t/seeker
Accurately Locate Smartphones using Social Engineering
different-ai/embedbase-ava
Obsidian + Embedbase = Ava
splunk-soar-connectors/microsoftdefenderforendpoint
humio/fdr2humio
Falcon Data Replica(ted) to Humio
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
josdemmers/Diablo4Companion
A companion app and loot filter for Diablo IV to help you find your perfect gear affixes.
LasCC/HackTools
The all-in-one browser extension for offensive security professionals 🛠
LOLBAS-Project/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
op7ic/EDR-Testing-Script
Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter/Invoke-DOSfuscation payloads
danielbohannon/Invoke-CradleCrafter
PowerShell Remote Download Cradle Generator & Obfuscator
corelight/pycommunityid
A Python implementation of the Community ID flow hashing standard
Significant-Gravitas/AutoGPT
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
onionshare/onionshare
Securely and anonymously share files, host websites, and chat with friends using the Tor network
securing/BucketScanner
A tool for testing objects' permissions in AWS buckets
CrowdStrike/logscale-community-content
This repository contains Community and Field contributed content for LogScale
WhiteWinterWolf/vmtools
Qemu virtual machines manager