Skip to content
View drb-ra's full-sized avatar

Block or report drb-ra

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement

PowerShell 159 25 Updated Dec 5, 2024
Python 125 9 Updated Feb 24, 2025

Windows inside a Docker container.

Shell 33,242 2,316 Updated Feb 25, 2025

Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop

Jupyter Notebook 61 10 Updated Feb 25, 2025

Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scenarios.

Go 173 15 Updated Sep 4, 2024

Powershell Linter

Rust 50 1 Updated Feb 6, 2025

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

193 19 Updated Jul 3, 2024

Powershell Based tool for gathering information related to O365 intrusions and potential Breaches

PowerShell 800 127 Updated Feb 26, 2025

Elastic Security Labs releases

Python 57 7 Updated Oct 28, 2024
Python 20 4 Updated Nov 30, 2023

Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.

Python 33 4 Updated Feb 25, 2025

RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact

Python 1,626 252 Updated Feb 25, 2025

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Python 1,364 253 Updated Feb 23, 2025

Extract C2 Traffic

C++ 248 36 Updated Nov 25, 2024

A light-weight first-stage C2 implant written in Nim (and Rust).

Rust 825 111 Updated Aug 3, 2024

A collection of fascinating and bizarre Censys Search Queries

1,043 117 Updated Jan 27, 2025

Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles

Python 159 24 Updated Oct 15, 2024

RedEye is a visual analytic tool supporting Red & Blue Team operations

TypeScript 2,694 278 Updated Oct 20, 2023

Windows kernel and user mode emulation.

Python 1,589 236 Updated Feb 19, 2025

Security ML models encoded as Yara rules

Python 213 27 Updated Jul 6, 2023

http://firewalla.com

JavaScript 565 130 Updated Feb 26, 2025

DEFCON30 Talk Material, References and Extra Bits

37 4 Updated Oct 30, 2022
Python 104 16 Updated Nov 15, 2023

An OOB interaction gathering server and client library

Go 3,606 383 Updated Feb 24, 2025

Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilit…

Dockerfile 266 46 Updated Feb 24, 2025

Data exfiltration and covert communication tool

Go 38 7 Updated Jan 10, 2023

Automated Red Team Infrastructure deployement using Docker

Python 1,225 205 Updated Aug 24, 2022

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

Python 3,085 645 Updated Jan 29, 2025

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Go 1,923 226 Updated Feb 25, 2025
Next
Showing results