- Malaysia
Lists (15)
Sort Name ascending (A-Z)
- All languages
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- CoffeeScript
- Dockerfile
- G-code
- Go
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Open Policy Agent
- PHP
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- TeX
- TypeScript
- VBA
- Vim Script
- Vue
- XSLT
- YAML
- YARA
Starred repositories
This repository it´s made for recieve people that are doing the BSCP certification (Burpsuite Certified Practiccioner)
A Portswigger Certification to learn advanced pen-testing techniques.
PortSwigger Academy lab writeups in preparation for Burpsuite Certified Practitioner
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Small and highly portable detection tests based on MITRE's ATT&CK.
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
In-depth repository of Telegram OSINT resources covering, tools, techniques & tradecraft.
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
Sublime rules for email attack detection, prevention, and threat hunting.
Open Adversarial Exposure Validation Platform
A ProcessMonitor visualization application written in rust.
The ESP32-BlueJammer (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts 2.4GHz communications. Using an ESP32 and nRF24 modules, it generates noise and unnecessary packets, causing int…
Threat Hunting Kiddie compile the techniques and Indicator of Compromise (IoC) to perform the Compromise Assessment and Threat Hunting.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelistin…
Python Tool for sending files over the network by simply pinging hosts.
A tool which is uses to remove Windows Defender in Windows 8.x, Windows 10 (every version) and Windows 11.
Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.
Securely and anonymously share files, host websites, and chat with friends using the Tor network
Set of tools to analyze Windows sandboxes for exposed attack surface.
IOCs collected during day-to-day activities
Create malware knowledge graphs from analysis reports
A curated list of annual cyber security reports
Interesting APT Report Collection And Some Special IOCs
A tool matrix for Russian APTs based on the Ransomware Tool Matrix
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports