Skip to content
View securitytracker's full-sized avatar
  • United States

Block or report securitytracker

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Everything tech - idiosyncratic opinion of a bunch of feeds , radars and technologists across the globe. Covering - Architecture , CloudPlatform , Development , Testing , EngineeringPractices , Non…

59 10 Updated Feb 12, 2025

The Volatility Collaborative GUI

JavaScript 237 20 Updated Feb 14, 2025

This script automates the generation of CSRs with X509v3 Subject Alternate Names.

Shell 4 2 Updated Mar 23, 2021

Ansible playbooks for configuring and managing Splunk Enterprise and Universal Forwarder deployments

Python 362 186 Updated Jan 23, 2025

Multi-Cloud Security Auditing Tool

Python 6,926 1,075 Updated Nov 19, 2024

Program to decode radio transmissions from devices on the ISM bands (and other frequencies)

C 6,377 1,370 Updated Feb 13, 2025

evilginx3 + gophish

Go 1,713 335 Updated Jun 15, 2024

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

Rust 2,448 210 Updated Feb 14, 2025

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]

PowerShell 7,075 1,309 Updated Sep 24, 2024

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

PowerShell 6,897 954 Updated Feb 10, 2025

A tool to keep AWS pentests and red teams efficient, organized, and stealthy.

Python 89 17 Updated Mar 11, 2024

A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.

Python 2,008 331 Updated Jul 14, 2024

Notice lists to inform users of MISP about legal or technical implication for some attributes, categories and objects

8 6 Updated Jun 15, 2020

Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks

65 11 Updated Aug 4, 2022

Tools for AWS forensics

Shell 64 16 Updated Mar 4, 2016

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,071 1,537 Updated Oct 28, 2024

Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.

Python 831 147 Updated May 14, 2024

AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation

Python 1,978 278 Updated Apr 3, 2023

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

Python 3,076 643 Updated Jan 29, 2025

The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

Python 4,533 720 Updated Jan 29, 2025

Faster version of `symchk /om` for generating PDB manifests of offline machines

Rust 19 14 Updated Apr 18, 2021

Faster version of `symchk /om` for generating PDB manifests of offline machines

Rust 54 11 Updated Feb 3, 2025

Enable non-Ubiquiti cameras to work with Unifi NVR

Python 1,752 241 Updated Jan 15, 2025

TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.

Jupyter Notebook 467 99 Updated Nov 13, 2024

Certificate extraction tool for Windows

125 36 Updated Dec 18, 2014

Open Source Platform for storing, organizing, and searching documents related to cyber threats

JavaScript 160 26 Updated Nov 10, 2023

Web browser forensics for Google Chrome/Chromium

Python 1,120 149 Updated Feb 11, 2025

The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifa…

HTML 573 47 Updated Nov 13, 2024

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

Python 2,047 341 Updated Jan 20, 2025
Next