DDTTX Tabletop Trainings
☆28Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for DDTTX
Users that are interested in DDTTX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- This repository is for a beginners PowerShell training course I am holding in central Missouri.☆20May 17, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 4 years ago
- Import python libraries over HTTP☆13Oct 28, 2024Updated last year
- Windows Event Forwarding/Collection - A simple way to get quick, comprehensive logging for a Windows environment.☆16Jun 5, 2022Updated 3 years ago
- Links to VeteranSec Resources☆12May 18, 2020Updated 5 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Oct 17, 2024Updated last year
- ☆12Jan 5, 2021Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆63Oct 7, 2024Updated last year
- Misc resources and documents on my security research☆21Jan 25, 2017Updated 9 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- Ultimate Cybersecurity Roadmap (2025 Edition) | Beginner to Advanced Guide | Learn Ethical Hacking, SOC Analysis, Threat Hunting, Inciden…☆33Jul 7, 2025Updated 8 months ago
- Bypass EDR(Endpoint Detection and Response) environment to write Behinder jsp webshell onto webserver☆13Dec 27, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A CALDERA plugin for autonomous incident response☆27Mar 18, 2026Updated last week
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 3 months ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 4 years ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- ☆42Dec 13, 2020Updated 5 years ago
- ☆39Dec 10, 2020Updated 5 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆301Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Capture the Flag write-ups for challenged completed by myself.☆13Dec 7, 2020Updated 5 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- Reflex SOAR☆12Apr 1, 2022Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year