toastr's Stars
charlax/professional-programming
A collection of learning resources for curious software engineers
elceef/dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
projectdiscovery/naabu
A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
hahwul/WebHackersWeapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
netwrix/pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
mattnotmax/cyberchef-recipes
A list of cyber-chef recipes and curated links
lkarlslund/Adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
frankwxu/digital-forensics-lab
Free hands-on digital forensics labs for students and faculty
hakluke/hakrevdns
Small, fast tool for performing reverse DNS lookups en masse.
Bert-JanP/Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
OWASP/wrongsecrets
Vulnerable app with examples showing how to not use secrets
EvotecIT/GPOZaurr
Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.
pan-unit42/iocs
Indicators from Unit 42 Public Reports
cristianzsh/forensictools
Collection of forensic tools
3nock/OTE
OSINT Template Engine
center-for-threat-informed-defense/tram
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
threatexpress/metatwin
The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into another.
jsa2/caOptics
CA Optics - Azure AD Conditional Access Gap Analyzer
offsecginger/koadic
zerosum0x0's Koadic
ancailliau/sans-indexes
Indexes for SANS Courses and GIAC Certifications
MzHmO/NtlmThief
Extracting NetNTLM without touching lsass.exe
center-for-threat-informed-defense/cti-blueprints
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
JulianHayward/AzADServicePrincipalInsights
Insights and change tracking on Microsoft Entra ID Service Principals (Enterprise Applications, Applications and Managed Identities)
LivingInSyn/RMML
A list of RMMs designed to be used in automation to build alerts
joeavanzato/LogBoost
Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indicator matches.
Cyb3rWard0g/IntelRAGU
Intel Retrieval Augmented Generation (RAG) Utilities
EvotecIT/ImagePlayground
ImagePlayground is a PowerShell module that provides a set of functions for image processing. Among other things it can create QRCodes, BarCodes, Charts, and do image processing that can help with daily tasks.
secureworks/BAADTokenBroker
3nock/OTE-Templates
Community curated list of templates for the OSINT template engine.
Vadims06/cisco-config-assessment
This tool allows you to differ your current config on multiple cisco network devices with master config. Then you will get the report about each device on your email.