Highlights
- Pro
Lists (4)
Sort Name ascending (A-Z)
Stars
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…
Firefly III: a personal finances manager
A curated list of CTF frameworks, libraries, resources and softwares
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types like zip, rar, docx, jpg, and more, allowing for customizable…
The fastest path to AI-powered full stack observability, even for lean teams.
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
CVE cache of the official CVE List in CVE JSON 5 format
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
The aim is to develop a custom lexer generator written in C++ like Flex that takes in a input program, which is a set of rules defining the lexical tokens and input characters from another input pr…
Interactive roadmaps, guides and other educational content to help developers grow in their careers.