Stars
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop
Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scenarios.
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
A light-weight first-stage C2 implant written in Nim (and Rust).
A collection of fascinating and bizarre Censys Search Queries
Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles
RedEye is a visual analytic tool supporting Red & Blue Team operations
An OOB interaction gathering server and client library
Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilit…
Automated Red Team Infrastructure deployement using Docker
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud