Skip to content
View reike's full-sized avatar

Block or report reike

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Technical add-on for Splunk related to TheHive/Cortex from TheHive project

Python 53 11 Updated Oct 29, 2024

Reverse Engineer's Toolkit

Inno Setup 4,863 502 Updated Apr 14, 2024

AssemblyLine4 documentation

HTML 28 15 Updated Dec 19, 2024

macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…

Python 2,201 406 Updated Aug 15, 2024

All-in-One malware analysis tool.

YARA 1,369 189 Updated Dec 21, 2024

Script for automating Linux memory capture and analysis

Shell 266 46 Updated Feb 1, 2020

Image Payload Creating/Injecting tools

Perl 1,207 242 Updated Nov 30, 2023

The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportunity to write a chapter of a book to get their name out ther…

Ruby 196 22 Updated Apr 29, 2024

πŸ“Ί(tv) Tidy Viewer is a cross-platform CLI csv pretty printer that uses column styling to maximize viewer enjoyment.

Rust 2,069 40 Updated Mar 29, 2024

Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.

Shell 49,155 2,747 Updated Nov 18, 2024

πŸ’€ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Python 2,900 388 Updated Oct 20, 2024
PowerShell 2,214 355 Updated Oct 14, 2023

Tools to assist in forensicating docker

Python 81 20 Updated Dec 30, 2024

β‘·β ‚πš”πšŠπš›πš–πšŠ 𝚟𝟸⠐Ⓘ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)

Shell 828 162 Updated Jun 13, 2024

code for the Proxy DLL example blog post

C 59 15 Updated Oct 29, 2021

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

Shell 5,827 939 Updated Dec 19, 2024

DNSTake β€” A fast tool to check missing hosted DNS zones that can lead to subdomain takeover

Go 836 68 Updated Feb 13, 2023

Sysmon for Linux

C 1,778 189 Updated Nov 15, 2024

ncurses-grep: interactively navigate grep-like results

C 31 4 Updated Mar 21, 2024

barq: The AWS Cloud Post Exploitation framework!

Python 386 65 Updated Nov 19, 2022

Python library to carry out DFIR analysis on the Cloud

Python 467 88 Updated Dec 15, 2024

Tiny script to verify if a domain or a list of domain is available.

Python 8 4 Updated Jul 22, 2021

The ultimate WinRM shell for hacking/pentesting

Ruby 4,629 619 Updated Dec 2, 2024

Configuration Hardening Assessment PowerShell Script (CHAPS)

PowerShell 174 41 Updated Apr 30, 2024

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 62,208 14,829 Updated Dec 4, 2024

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,448 1,035 Updated Nov 7, 2024

PKE Meter - Automated script to search "ghosts" and extract objects from Active Directory

PowerShell 9 Updated Sep 22, 2024

Files for the packer tutorial

C 73 19 Updated Feb 21, 2021

All of the ad-hoc things you're doing to manage incidents today, done for you, and much more!

Python 5,224 517 Updated Dec 30, 2024

Example of using ELF hacking to inject malicious code into a target binary

C 21 6 Updated Feb 20, 2020
Next