Stars
Three datasets to practice Threat Hunting against.
Some information gathering techniques across the open source intelligence available
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Malware Configuration And Payload Extraction
SharpSploit is a .NET post-exploitation library written in C#
π A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»
A curated list of Awesome Threat Intelligence resources
Machine Learning for Cyber Security
Python abstract API for PassiveTotal services in the form of libraries and command line utilities.
Empire is a PowerShell and Python post-exploitation agent.
Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Please no pull requests for this repository. Thanks!
A curated list of awesome YARA rules, tools, and people.
YARA signature and IOC database for my scanners and tools
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Small and highly portable detection tests based on MITRE's ATT&CK.
An information security preparedness tool to do adversarial simulation.
PowerSploit - A PowerShell Post-Exploitation Framework
Course Files for Complete Python 3 Bootcamp Course on Udemy