Tactics, Techniques, and Procedures
☆28Jan 20, 2025Updated last year
Alternatives and similar repositories for TTPs
Users that are interested in TTPs are comparing it to the libraries listed below
Sorting:
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- Direct system calls by nim☆14Mar 15, 2022Updated 4 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆17Feb 25, 2026Updated 3 weeks ago
- ☆36Mar 28, 2025Updated 11 months ago
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- ☆18Oct 20, 2021Updated 4 years ago
- Docker container to use blutter (dart decompiler for android apps)☆22Sep 18, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 weeks ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- 🔨 List IP ranges of: Google, Bing, Amazon and Cloudfront, Microsoft, Azure, Oracle, DigitalOcean, GitHub, Facebook, Twitter, Linode, Yan…☆22Updated this week
- 1000个PHP代码审计案例(2016.7以前乌云公开漏洞)☆11Sep 30, 2016Updated 9 years ago
- Categorization of IP Addresses☆18Mar 11, 2026Updated last week
- BlackArch Linux Wiki☆13Feb 9, 2026Updated last month
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- JetBrains Academy projects☆14Oct 15, 2020Updated 5 years ago
- Capture the flag Game☆17Apr 14, 2025Updated 11 months ago
- My notes of Day1 Day2 will be posted here as journey☆17Jan 6, 2021Updated 5 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆14Dec 14, 2019Updated 6 years ago
- tracing with frida-trace some native apis or libs☆23Nov 19, 2020Updated 5 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- DSH - Discord Server Hunter ; a Python OSiNT tool to look for Discord servers using Google dorking techniques☆14Jul 29, 2022Updated 3 years ago
- Enumeração de Usuário☆58Feb 20, 2026Updated last month
- ☆20Feb 6, 2024Updated 2 years ago
- dotfiles, configs, tips, docs, & h4x☆17Feb 12, 2026Updated last month
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- 红方人员作战执行手册☆11Feb 22, 2020Updated 6 years ago
- 读取微信联系人列表,版本(3.9.12.51)☆13Mar 22, 2025Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year