ImpostorKeanu / sec-vault-gen
Python utility to generate filesystem content for Obsidian.
☆83Updated last year
Related projects: ⓘ
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- ☆167Updated this week
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated 2 months ago
- A repo to support the book☆103Updated 3 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- ☆76Updated 4 years ago
- ☆68Updated 2 years ago
- ☆111Updated 3 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆105Updated 3 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆61Updated 5 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆144Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆73Updated 3 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆149Updated 6 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆216Updated 2 years ago
- Active Directory Purple Team Playbook☆103Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆137Updated last year
- An active directory laboratory for penetration testing.☆124Updated 3 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆110Updated last year
- Automated security lab provisioning☆65Updated 2 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆192Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆67Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- ☆59Updated 3 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- Slides, documentation, and files from my presentation at Red Team Village for HackerOne's hacktivitycon.☆34Updated 3 years ago
- Azure AD cheatsheet for the CARTP course☆94Updated 2 years ago
- ☆99Updated 3 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆69Updated last week