-
Data-Sec GmbH
- Germany, DE
-
16:38
(UTC +01:00)
Lists (1)
Sort Name ascending (A-Z)
Stars
⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident response processes
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
A tool to elevate privilege with Windows Tokens
Apache CloudStack is an opensource Infrastructure as a Service (IaaS) cloud computing platform
Sourcetrail - free and open-source interactive source explorer
Policy Module for Microsoft Active Directory Certificate Services
Collection of malware source code for a variety of platforms in an array of different programming languages.
Repo containing cracked red teaming tools.
🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.
🛡️ Open-source and next-generation Web Application Firewall (WAF)
LinksHub aims to provide developers with access to a wide range of free resources and tools that they can use in their work. These resources include links to free software, libraries, frameworks, a…
Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-m…
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
A POC to disable TamperProtection and other Defender / MDE components
User mode file system library for windows with FUSE Wrapper
Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advanced methods, and efficient sniffers. Ideal for cybersecur…
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
A set of Zeek scripts to detect ATT&CK techniques.
Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protections.
Windows Internals Book 7th edition Tools
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Example extension for KCM demonstrating dynamic injection of parameter tokens.
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities
Scripts to help automate various administrative tasks