ImpostorKeanu / sec-vault-gen
Python utility to generate filesystem content for Obsidian.
☆84Updated last year
Alternatives and similar repositories for sec-vault-gen:
Users that are interested in sec-vault-gen are comparing it to the libraries listed below
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated 6 months ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- A repo to support the book☆104Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆147Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 2 years ago
- ☆68Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- ☆63Updated 3 years ago
- Python API for interacting with sigma rules.☆49Updated 2 years ago
- ☆77Updated 5 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- ☆46Updated last month
- ☆36Updated 6 months ago
- Simple parser to get useful information from AWS S3 logs☆24Updated 3 years ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆43Updated last year
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated 6 months ago
- Active Directory Purple Team Playbook☆105Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆29Updated 11 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- ☆113Updated 3 years ago