Pinned Repositories
.Exe-to-.Doc-Exploit
$2100 .Exe to .Doc Exploit (Python)
0xsp-Mongoose
Privilege Escalation Enumeration Toolkit (64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Adama
Searches For Threat Hunting and Security Analytics
nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
vuln-chm-hijack
Potential malicious code execution via CHM hijacking (CVE-2019-9896)
yehias's Repositories
yehias/cb-response-surveyor
A simple survey tool for Cb Response
yehias/Volatility-AutoModule-Result
Volatility module.c kernel symbol generator for (almost all) Linux kernel version
yehias/awesome-forensics
A curated list of awesome forensic analysis tools and resources
yehias/BruteShark
Network Analysis Tool
yehias/Slides
yehias/SEC505
yehias/h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
yehias/DetectionLabELK
DetectionLabELK is a fork from Chris Long's DetectionLab with ELK stack instead of Splunk.
yehias/dolos_cloak
Automated 802.1x Bypass
yehias/dfir-toolset
Dump of organized knowledge on DFIR
yehias/LogonTracer
Investigate malicious Windows logon by visualizing and analyzing Windows event log
yehias/SysmonCommunityGuide
TrustedSec Sysinternals Sysmon Community Guide
yehias/Adama
Searches For Threat Hunting and Security Analytics
yehias/at-ps
Adversary Tactics - PowerShell Training
yehias/SharpRDP
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
yehias/mercury
Mercury: network fingerprinting and packet metadata capture
yehias/PowerSponse
PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.
yehias/Gh0stHunt
Gh0stHunt is an Incident Response Investigative Framework written in PowerShell that computer network defenders, hunt teams and forensic analysts can use to retrieve and analyze information, baseline, hunt for Indicators of Compromise (IOCs) and mitigate IOCs across remote Windows systems.
yehias/spraykatz
Credentials gathering tool automating remote procdump and parse of lsass process.
yehias/CDQR
The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted drives and extracted artifacts from Windows, Linux, MacOS, and Android devices
yehias/chaff
Windows honeyport that listens for full handshakes as well as SYN scans
yehias/Net-GPPPassword
.NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.
yehias/W2RC
Windows Registry and RAM Collector
yehias/volatility
An advanced memory forensics framework
yehias/pwnagotchi
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
yehias/plaso
Super timeline all the things
yehias/JShielder
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
yehias/SysAnalyzer
Automated malcode analysis system - read more ->
yehias/Registry-Write-Block
Short scripts which use the registry to enable or disable write-blocking for removable disks
yehias/Redcloud
Comfy & powerful Red Team Infrastructure deployement using Docker