zoerab
"For any mystery can be solved through the application of knowledge and unrelenting effort" ―Darth Plagueis
Belgium
Pinned Repositories
Malware-Analysis-Training
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
sec-tools
A set of security related tools
SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
SysmonTools
Utilities for Sysmon
TJ-JPT
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
zoerab's Repositories
zoerab/Adversary3
Malware vulnerability intel tool for third-party attackers.
zoerab/ani-cli
A cli tool to browse and play anime
zoerab/CSIRT-Collect
PowerShell script to collect memory and (triage) disk forensics
zoerab/DefenderStop
Stop Defender Service using C# via Token Impersonation
zoerab/Demos
Repo Filled With Follow Along Guides
zoerab/EVTX-ATTACK-SAMPLES
Windows Events Attack Samples
zoerab/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
zoerab/Kansa
A Powershell incident response framework
zoerab/kloak
Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.
zoerab/learning-malware-analysis
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
zoerab/linux
Linux kernel source tree
zoerab/LSMS
Linux Security and Monitoring Scripts
zoerab/Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.
zoerab/Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
zoerab/modern-unix
A collection of modern/faster/saner alternatives to common unix commands.
zoerab/mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
zoerab/OSEP-Code-Snippets
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
zoerab/peepdf
Powerful Python tool to analyze PDF documents
zoerab/Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
zoerab/RAASNet
Open-Source Ransomware As A Service for Linux, MacOS and Windows
zoerab/Raspberry-Pi-4-Code-Server
zoerab/s-tui
Terminal-based CPU stress and monitoring utility
zoerab/ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
zoerab/SUWtHEh-
Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics
zoerab/sysmon-cheatsheet
All sysmon event types and their fields explained
zoerab/the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook
zoerab/trident
A PowerShell incident response script for quick triage
zoerab/undervolt
Undervolt Intel CPUs under Linux
zoerab/wireshark-workshop
pcaps of traffic for traffic analysis workshop
zoerab/Z0FCourse_ReverseEngineering
Reverse engineering focusing on x64 Windows.