Lists (9)
Sort Name ascending (A-Z)
Stars
Open Breach and Attack Simulation Platform
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,โฆ
Sample threat hunting report provided by Hunting Adversaries
A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
Open source templates you can use to bootstrap your security programs
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
A repository of credential stealer formats
Starkiller is a Frontend for PowerShell Empire.
Digital Forensics Investigation Platform
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of tโฆ
Security Certification Roadmap HTML5/CSS3 version
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
This map lists the essential techniques to bypass anti-virus and EDR
A framework for developing alerting and detection strategies for incident response.
The Enhanced MITRE ATT&CKยฎ Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simplifies tracking of security readiness against ATT&CKยฎ tacticโฆ
Magnificent app which corrects your previous console command.
PowerShell Digital Forensics & Incident Response Scripts.
AutoMacTC: Automated Mac Forensic Triage Collector
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection.
A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.
This is a tool for Linux kernel ftrace and perf events visualization
Open Source Vulnerability Management Platform
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)
I hope these Microsoft Intune Remediations inspire you to make your own!
Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.