vinegrep's Stars
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
IvanGlinkin/CCTV
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in real-time for logistics or safety, redefining how we navigate our surroundings
Notselwyn/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
antonioCoco/RemotePotato0
Windows Privilege Escalation from User to Domain Admin.
infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
subat0mik/Misconfiguration-Manager
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
WINSDK/bite
Disassembler focused on comprehensive rust support.
ch33r10/EnterprisePurpleTeaming
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
SpecterOps/Nemesis
An offensive data enrichment pipeline
CICADA8-Research/RemoteKrbRelay
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
foxlox/GIUDA
Ask a TGS on behalf of another user without password
Helixo32/CrimsonEDR
Simulate the behavior of AV/EDR for malware development training.
bcoles/kasld
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
Fortiphyd/GRFICSv2
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
Meowmycks/LetMeowIn
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
blacklanternsecurity/TREVORproxy
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
KDot227/SomalifuscatorV2
Most advanced and poorly coded windows batch obfuscator ever made (aka the best)
RedefiningReality/Cobalt-Strike
Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection
HexaCluster/pgdsat
PostgreSQL Database Security Assessment Tool
decoder-it/ADCSCoercePotato
TalEliyahu/awesome-CISO-maturity-models
Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide benchmark for appraising current processes outcomes.
MzHmO/TGSThief
My implementation of the GIUDA project in C++
its-a-feature/offensive_macos
Tracking of offensive macOS tooling, blogs, and related helpful information
RePRGM/Nimperiments
Various one-off pentesting projects written in Nim. Updates happen on a whim.
cybersectroll/TrollAMSI
cybersectroll/TrollUAC
HuskyHacks/SharpTokenFinder
C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps
cybersectroll/SharpPersistSD
brmkit/ad-training-lab
Automated Active Directory lab running on Proxmox