- South Carolina, USA
-
22:33
(UTC -12:00)
Highlights
Security
DNS block list that can be used for AdGuardHome.
A repo containing DNS blocklists and allowlist/s. Various categories of lists, updated and validated often. Wiki included.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
🕵️♂️ All-in-one OSINT tool for analysing any website
Ghidra is a software reverse engineering (SRE) framework
⭐ ⭐ ⭐ Build your own IP Attack Maps with SOUND!
Fast passive subdomain enumeration tool.
A companion repository to the Canva engineering blog post on how to do endpoint vulnerability management.
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
GoCrack is a management frontend for password cracking tools written in Go
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…
Security risk analysis for Kubernetes resources
Small and highly portable detection tests based on MITRE's ATT&CK.
AVD Accelerator deployment automation to simplify the setup of AVD (Azure Virtual Desktop) based on best practices
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
Sample queries and data as part of the Microsoft Press book, The Definitive Guide to KQL
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Config files for my GitHub profile.
Cyber Threat Intelligence Repository expressed in STIX 2.0
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Autoswagger by Intruder - detect API auth weaknesses
A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.