Stars
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
Practical Threat Detection Engineering, Published by Packt
A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
Cyber Threat Intelligence Repository expressed in STIX 2.0
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Simple Automated Powershell Keylogger
Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop
A python module for working with ATT&CK
This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Obsidian
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Tool for Active Directory Certificate Services enumeration and abuse
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allo…
A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.
Real-time, container-based file scanning at enterprise scale
Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.
windows-kernel-exploits Windows平台提权漏洞集合
A curated list of tools, papers and techniques for Windows exploitation and incident response.
Username tools for penetration testing
Bloodhound Reporting for Blue and Purple Teams
Kali Linux Fixes for Newly Imported VM's
My notes while studying for the PNPT from TCM Security.
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.