Stars
A TensorFlow implementation of Google's Tacotron speech synthesis with pre-trained model (unofficial)
Data from a BRAWL Automated Adversary Emulation Exercise
Information released publicly by NCC Group's Cyber Incident Response Team
Open-source framework to detect outliers in Elasticsearch events
A GitHub action that displays a gif of Conan O'Brien shaking his finger to a pull request on fail.
Docker configuration to quickly setup your own Canarytokens.
PyGraphistry is a Python library to quickly load, shape, embed, and explore big graphs with the GPU-accelerated Graphistry visual graph analyzer
Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
SQL powered operating system instrumentation, monitoring, and analytics.
Elasticsearch/Kibana environment and log data for Sigma workshop
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
A curated list of awesome YARA rules, tools, and people.
A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.
Building an Active Directory domain and hacking it
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events…
An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.
PowerShell Obfuscation Detection Framework
PowerShell script for deobfuscating encoded PowerShell scripts
A Linux Auditd rule set mapped to MITRE's Attack Framework
An open-source post-exploitation framework for students, researchers and developers.
Course materials for Modern Binary Exploitation by RPISEC
A Python Automated Machine Learning tool that optimizes machine learning pipelines using genetic programming.