Stars
This map lists the essential techniques to bypass anti-virus and EDR
Useful resources for SOC Analyst and SOC Analyst candidates.
A collection of sources of documentation, as well as field best practices, to build/run a SOC
GRR Rapid Response: remote live forensics for incident response
Open Cyber Threat Intelligence Platform
A tool to recover content from files encrypted with intermittent encryption
程序员在家做饭方法指南。Programmer's guide about how to cook at home (Simplified Chinese only).
A list of Free Software network services and web applications which can be hosted on your own servers
Program for determining types of files for Windows, Linux and MacOS.
WhisperX: Automatic Speech Recognition with Word-level Timestamps (& Diarization)
Tips on how to write exploit scripts (faster!)
Free hands-on digital forensics labs for students and faculty
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A Clash GUI based on tauri. Supports Windows, macOS and Linux.
🕵️♂️ All-in-one OSINT tool for analysing any website
Adversary Tactics - PowerShell Training
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective…
Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)
A concise, directive, specific, flexible, and free incident response plan template
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
Another Windows Local Privilege Escalation from Service Account to System
Compiled Binaries for Ghostpack