Starred repositories
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…
HarmBench: A Standardized Evaluation Framework for Automated Red Teaming and Robust Refusal
🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.
Simple Python Code Obfuscator. Supports python2 & python3
Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)
A collection of templates for bug bounty reporting
A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily i…
A repository of curated datasets from various attacks
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Python tool for converting files and office documents to Markdown.
Extract and execute a PE embedded within a PNG file using an LNK file.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
KQL Queries. Microsoft Defender, Microsoft Sentinel
Collection of papers, datasets, code and other resources for object tracking and detection using deep learning