Lists (18)
Sort Name ascending (A-Z)
Stars
Official writeups for Business CTF 2024: The Vault Of Hope
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for m…
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Fast, minimal blog with dark mode support.
Detect Tactics, Techniques & Combat Threats
An informational repo about hunting for adversaries in your IT environment.
Please no pull requests for this repository. Thanks!
Reverse engineering focusing on x64 Windows.
Collection of example YARA-L rules for use within Google Security Operations
Elastic Security detection content for Endpoint
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management. Has features such as HVNC, live microphone, reverse prox…
A binary authorization and monitoring system for macOS
DFIRTrack - The Incident Response Tracking Application
GRR Rapid Response: remote live forensics for incident response
Identifies the bytes that Microsoft Defender flags on.
Automation and Scaling of Digital Forensics Tools