Skip to content
View threatHNTR's full-sized avatar

Block or report threatHNTR

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting

1,071 169 Updated Nov 12, 2024

Practical Threat Detection Engineering, Published by Packt

61 14 Updated Jul 3, 2023

A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…

162 14 Updated Dec 6, 2024

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…

Python 412 83 Updated Dec 9, 2024

Cyber Threat Intelligence Repository expressed in STIX 2.0

1,768 419 Updated Nov 12, 2024

Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.

Ruby 566 101 Updated Dec 12, 2022

Simple Automated Powershell Keylogger

PowerShell 22 4 Updated May 21, 2020

Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop

57 9 Updated Dec 13, 2024

A python module for working with ATT&CK

Python 490 110 Updated Nov 12, 2024

This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.

76 3 Updated Aug 30, 2024

This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Obsidian

186 26 Updated Dec 6, 2024

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

5,747 1,224 Updated Oct 4, 2024

Tool for Active Directory Certificate Services enumeration and abuse

Python 2,478 344 Updated Aug 19, 2024

Active Directory certificate abuse.

C# 1,542 219 Updated Aug 12, 2024

BloodHound Attack Research Kit

PowerShell 501 65 Updated Nov 19, 2024

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allo…

Go 103 12 Updated Aug 26, 2024

A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.

C# 248 27 Updated Sep 14, 2023

Real-time, container-based file scanning at enterprise scale

Python 886 116 Updated Dec 16, 2024

Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.

Python 187 10 Updated Sep 5, 2024

windows-kernel-exploits Windows平台提权漏洞集合

C 8,152 2,841 Updated Jun 11, 2021

JMX enumeration and attacking tool.

Java 400 46 Updated Dec 10, 2024

A curated list of tools, papers and techniques for Windows exploitation and incident response.

AutoIt 40 8 Updated Apr 10, 2016

🕵️‍♂️ Offensive Google framework.

Python 15,883 1,325 Updated Oct 23, 2024

Username tools for penetration testing

Ruby 882 139 Updated Sep 20, 2024

A fast TCP/UDP tunnel over HTTP

Go 13,783 1,415 Updated Sep 28, 2024

Bloodhound Reporting for Blue and Purple Teams

Python 1,133 112 Updated Oct 2, 2024

Kali Linux Fixes for Newly Imported VM's

Shell 1,997 341 Updated Dec 4, 2024

My notes while studying for the PNPT from TCM Security.

56 19 Updated Apr 24, 2024

This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010

Python 1,200 313 Updated Dec 24, 2023

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

190 18 Updated Jul 3, 2024
Next