Starred repositories
🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.
Supplemental information and resources for the Security Benchmark documentation available at https://docs.microsoft.com/azure/security/benchmarks/.
A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.
A static start page to get to your most important links, FAST.
A remote control and remote scripting solution, built with .NET 8, Blazor, and SignalR.
🚀 A self-hostable personal dashboard built for you. Includes status-checking, widgets, themes, icon packs, a UI editor and tons more!
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…
Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without relying on event logs
Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
Collections of tools and methods created to aid in OSINT collection
A repository to share publicly available Velociraptor detection content
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Repository with Sentinel Analytics Rules, Hunting Queries and helpful external data sources.
A secure low code honeypot framework, leveraging AI for System Virtualization.
A HTTP Web Server Framework Written In C (Just For Fun)
Modular visual interface for GDB in Python
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…
Red Teaming Tactics and Techniques
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
The repo contains a series of challenges for learning Frida for Android Exploitation.
This is an AD pentest tools collection
An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.