Black Friday deals (Cyber/OSINT/Infosec)
☆29Dec 6, 2020Updated 5 years ago
Alternatives and similar repositories for Blackfriday-Deals-2020
Users that are interested in Blackfriday-Deals-2020 are comparing it to the libraries listed below
Sorting:
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Slides and material from my conference presentations☆16Mar 30, 2024Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- Recon Hunt Queries☆79May 16, 2021Updated 4 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- ☆16May 22, 2014Updated 11 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Dec 20, 2019Updated 6 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆21Updated this week
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- ☆20Feb 22, 2021Updated 5 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- ☆21Jul 29, 2019Updated 6 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- ☆24Apr 16, 2019Updated 6 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- ☆57May 13, 2020Updated 5 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago