Stars
Open Attack Simulation & Security Validation Platform
Open Source Security Operations Center Documentation
Gather and update all available and newest CVEs with their PoC.
Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log refere…
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…
Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy
A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.
Virtual Machine for Adversary Emulation and Threat Hunting
This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at the forefront of the field. It serves as a central repository…
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
Practical Threat Detection Engineering, Published by Packt
A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
Cyber Threat Intelligence Repository expressed in STIX 2.0
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Simple Automated Powershell Keylogger
Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop
A python module for working with ATT&CK
This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Obsidian
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Tool for Active Directory Certificate Services enumeration and abuse
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allo…
A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.
Real-time, container-based file scanning at enterprise scale
Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.
windows-kernel-exploits Windows平台提权漏洞集合