Skip to content
View DashTX707's full-sized avatar

Block or report DashTX707

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Presentations

10 2 Updated Nov 27, 2020

Project based on RegRipper, to extract add'l value/pivot points from TLN events file

Perl 82 8 Updated Nov 13, 2024

PowerSCCM - PowerShell module to interact with SCCM deployments

PowerShell 348 105 Updated Jan 22, 2022

Miscellaneous projects related to attacking Windows.

C++ 186 111 Updated Nov 2, 2014

Frontpage and Sharepoint fingerprinting and attack tool.

Python 280 76 Updated Aug 8, 2021

The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.

Python 3,036 823 Updated Nov 4, 2020

A tool matrix for Russian APTs based on the Ransomware Tool Matrix

190 37 Updated Nov 10, 2024

Sigma open source rules in LimaCharlie format.

Python 4 5 Updated Aug 11, 2024

A resource containing all the tools each ransomware gangs uses

841 96 Updated Dec 11, 2024

Laika BOSS: Object Scanning System

Python 743 156 Updated Dec 16, 2024

Real-time, container-based file scanning at enterprise scale

Python 890 118 Updated Dec 16, 2024

Official Black Hat Arsenal Security Tools Repository

3,951 1,144 Updated Aug 26, 2024

Code samples for No Starch Press Black Hat Go

JavaScript 1,159 392 Updated Mar 29, 2024

Guides, Tools, Tips and such for working with the Shadow Brokers dumps

Batchfile 221 88 Updated Dec 6, 2018

💥 A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden.

1,114 160 Updated Jan 14, 2020

R package for MS meta-analysis

R 5 1 Updated Nov 8, 2019

Notes & exercise solutions of Part I from the book: "Hands-On ML with Scikit-Learn, Keras & TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems" by Aurelien Geron

Jupyter Notebook 852 388 Updated Apr 18, 2024

Docs and samples for privileged identity and access management in Microsoft Azure and Microsoft Entra.

PowerShell 141 27 Updated Oct 27, 2024

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log ag…

Go 744 49 Updated Nov 28, 2024

Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

C++ 1,105 216 Updated Jul 5, 2023

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Python 1 Updated Jul 16, 2024

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Python 1,305 239 Updated Dec 28, 2024

Handy scripts developed and discussed on http://auditcasts.com

Perl 19 6 Updated Aug 19, 2019

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,035 1,345 Updated Oct 28, 2024

Rules for the Detection Engine in Elastic Security

Python 5 1 Updated Aug 20, 2024

A list of useful Detection Engineering-related resources.

2 Updated Apr 10, 2023

Your window into the Elastic Stack

TypeScript 2 Updated Oct 31, 2022

Elastic Integrations

Handlebars 1 Updated Sep 30, 2022
Python 1 Updated May 25, 2022
Next