Lists (1)
Sort Name ascending (A-Z)
Stars
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC architecture.
Basics on commands/tools/info on how to assess the security of mobile applications
A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
The challenges I created for AKASEC CTF 2024
A collection of ctf challenges based on Rareskills educational content
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.
Django styleguide used in HackSoft projects
This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showcasing the implementation and comparison of different machine …
PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html
Algorithm and data structure articles for https://cp-algorithms.com (based on http://e-maxx.ru)
Fifth cohort of Ethereum Protocol Fellowship
Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
Collection of terraform codes for various Azure network topologies.
An NTFS/FAT parser for digital forensics & incident response
Forensics tool for NTFS (parser, mft, bitlocker, deleted files)
The recursive internet scanner for hackers. 🧡
All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks