Skip to content
View threatHNTR's full-sized avatar

Block or report threatHNTR

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Open Attack Simulation & Security Validation Platform

Java 938 103 Updated Mar 8, 2025

Open Source Security Operations Center Documentation

136 28 Updated Mar 4, 2025

Gather and update all available and newest CVEs with their PoC.

HTML 6,788 860 Updated Mar 8, 2025

Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log refere…

HTML 75 11 Updated Feb 24, 2025

PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…

PHP 579 99 Updated Feb 24, 2025

Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy

HCL 58 30 Updated Mar 6, 2025

A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.

Jupyter Notebook 241 58 Updated Jul 19, 2021

Virtual Machine for Adversary Emulation and Threat Hunting

1,262 196 Updated Jan 22, 2025

This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at the forefront of the field. It serves as a central repository…

C++ 365 65 Updated Dec 7, 2024

A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting

1,136 180 Updated Nov 12, 2024

Practical Threat Detection Engineering, Published by Packt

65 16 Updated Jul 3, 2023

A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…

188 17 Updated Feb 26, 2025

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…

Python 492 93 Updated Feb 14, 2025

Cyber Threat Intelligence Repository expressed in STIX 2.0

1,813 423 Updated Nov 12, 2024

Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.

Ruby 586 100 Updated Dec 12, 2022

Simple Automated Powershell Keylogger

PowerShell 22 4 Updated May 21, 2020

Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop

Jupyter Notebook 67 10 Updated Feb 26, 2025

A python module for working with ATT&CK

Python 521 118 Updated Jan 13, 2025

This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.

76 4 Updated Aug 30, 2024

This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Obsidian

207 30 Updated Dec 6, 2024

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

5,934 1,244 Updated Oct 4, 2024

Tool for Active Directory Certificate Services enumeration and abuse

Python 2,608 364 Updated Aug 19, 2024

Active Directory certificate abuse.

C# 1,607 222 Updated Aug 12, 2024

BloodHound Attack Research Kit

PowerShell 517 66 Updated Dec 19, 2024

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allo…

Go 126 17 Updated Feb 20, 2025

A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.

C# 252 28 Updated Sep 14, 2023

Real-time, container-based file scanning at enterprise scale

Python 907 121 Updated Mar 7, 2025

Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.

Python 192 11 Updated Jan 9, 2025

windows-kernel-exploits Windows平台提权漏洞集合

C 8,229 2,846 Updated Jun 11, 2021

JMX enumeration and attacking tool.

Java 420 45 Updated Jan 23, 2025
Next