Skip to content
View eugenepjk's full-sized avatar

Block or report eugenepjk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Weiss Schwarz Montage Tools (including parsing and exporting)

C# 24 4 Updated Oct 21, 2024

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…

PowerShell 1,940 190 Updated Dec 11, 2024

TA505+ Adversary Simulation

C# 65 14 Updated Nov 30, 2020

A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.

Python 4,065 816 Updated Feb 15, 2024

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Go 1,877 220 Updated Jan 1, 2025

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,455 1,037 Updated Nov 7, 2024

An informational repo about hunting for adversaries in your IT environment.

1,731 376 Updated Nov 17, 2021

MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository

Python 110 22 Updated Apr 24, 2023

Virtual Machine for Adversary Emulation and Threat Hunting

1,253 194 Updated Jul 13, 2020

🗣️ Tool to generate adversarial text examples and test machine learning models against them

Python 399 57 Updated Jan 7, 2022

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 1,758 315 Updated Jan 5, 2024

Adversary Tactics - PowerShell Training

PowerShell 1,529 332 Updated Jan 22, 2020

Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.

728 127 Updated Nov 16, 2021

Adversary Emulation Framework

Go 8,740 1,165 Updated Jan 6, 2025

syslog-ng is an enhanced log daemon, supporting a wide range of input and output methods: syslog, unstructured text, queueing, SQL & NoSQL.

C 2,163 477 Updated Jan 6, 2025
Python 864 154 Updated Jun 19, 2024

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in…

Python 378 81 Updated Jun 17, 2022

Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.

C 837 109 Updated Jan 20, 2022

Awesome list of step by step techniques to achieve Remote Code Execution on various apps!

Dockerfile 1,857 219 Updated Oct 7, 2023

A command line tool that resembles a debugger as well as Cheat Engine, to search for values in memory

Rust 219 16 Updated May 28, 2022

Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.

Python 554 121 Updated Dec 27, 2024

KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).

C# 1,552 208 Updated Aug 6, 2022

Basics on commands/tools/info on how to assess the security of mobile applications

1,511 235 Updated Dec 19, 2023
C# 443 75 Updated Nov 20, 2022

Attify OS - Distro for pentesting IoT devices

959 166 Updated Aug 26, 2021

Toolkit to emulate firmware and analyse it for security vulnerabilities

Python 1,371 259 Updated Sep 16, 2024

Execute ELF files without dropping them on disk

Python 486 50 Updated Jun 28, 2024

Recursive MMIO VM Escape PoC

C 171 24 Updated May 13, 2022

Background video recorder

Java 9 5 Updated Oct 12, 2017
Next