Skip to content
View code2319's full-sized avatar
💭
ʕ ᵔᴥᵔ ʔ
💭
ʕ ᵔᴥᵔ ʔ

Block or report code2319

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Official writeups for Business CTF 2024: The Vault Of Hope

Python 143 39 Updated Dec 4, 2024

Splunk Content Control Tool

Python 107 27 Updated Mar 17, 2025

Open EDR public repository

C++ 2,365 460 Updated Jan 13, 2024

Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode

PowerShell 2,239 467 Updated Nov 15, 2023

Living Off The Land Drivers

YARA 1,130 134 Updated Mar 7, 2025

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,364 1,370 Updated Oct 28, 2024

Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for m…

Python 455 59 Updated Dec 3, 2024

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 7,368 1,025 Updated Feb 15, 2025

Fast, minimal blog with dark mode support.

HTML 561 204 Updated Mar 9, 2025

Detect Tactics, Techniques & Combat Threats

SCSS 2,127 340 Updated Jan 29, 2025

An informational repo about hunting for adversaries in your IT environment.

1,757 377 Updated Nov 17, 2021

Please no pull requests for this repository. Thanks!

Python 2,148 545 Updated Mar 14, 2025

Reverse engineering focusing on x64 Windows.

C++ 5,331 521 Updated Aug 1, 2024

Collection of example YARA-L rules for use within Google Security Operations

Python 366 86 Updated Mar 12, 2025
Python 2,062 530 Updated Mar 15, 2025

Elastic Security detection content for Endpoint

YARA 1,136 130 Updated Mar 7, 2025

PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…

PHP 599 103 Updated Feb 24, 2025

Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

Python 1,766 215 Updated Jan 4, 2024

Network Analysis Tool

C# 3,208 354 Updated Apr 10, 2023

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Jinja 2,238 376 Updated Mar 17, 2025

The Volatility Collaborative GUI

JavaScript 240 21 Updated Mar 12, 2025

PoC for using TLS in Win8.1 and above

C++ 9 3 Updated May 7, 2020

Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management. Has features such as HVNC, live microphone, reverse prox…

C# 1,163 310 Updated Mar 5, 2024

A binary authorization and monitoring system for macOS

Objective-C++ 4,483 296 Updated Feb 5, 2025

DFIRTrack - The Incident Response Tracking Application

Python 492 75 Updated Sep 4, 2024

GRR Rapid Response: remote live forensics for incident response

Python 4,856 772 Updated Feb 27, 2025

Identifies the bytes that Microsoft Defender flags on.

C# 2,409 430 Updated Sep 14, 2023

Because AV evasion should be easy.

Go 670 62 Updated Nov 28, 2024

Automation and Scaling of Digital Forensics Tools

Python 760 167 Updated Mar 6, 2025
Next