Lists (1)
Sort Name ascending (A-Z)
Stars
This repo is about Active Directory Advanced Threat Hunting
Programming in assembly language tutorial
Portable Executable reversing tool with a friendly GUI
Freeze (package) Python programs into stand-alone executables
An advanced memory forensics framework
TiDB database documentation. TiDB is an open-source, cloud-native, distributed, MySQL-Compatible database for elastic scale and real-time analytics. Try AI-powered Chat2Query free at : https://www.…
"Evolving AppCompat/AmCache data analysis beyond grep"
MHaggis / KrbRelayUp
Forked from Dec0ne/KrbRelayUpKrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
PowerShell tools to help defenders hunt smarter, hunt harder.
Lists of sources and utilities utilized to hunt, detect and prevent evildoers.
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Folder Or File Delete to Get System Shell on Current Session Desktop
🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.
Get up and running with Llama 3.3, DeepSeek-R1, Phi-4, Gemma 2, and other large language models.
A centralized and enhanced memory analysis platform
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Mapping of open-source detection rules and atomic tests.
A repository of sysmon configuration modules
Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
A cheat sheet for Kubernetes commands. kubectl cheat sheet.