Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC
☆61Jan 10, 2022Updated 4 years ago
Alternatives and similar repositories for PHR-model
Users that are interested in PHR-model are comparing it to the libraries listed below
Sorting:
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 3 weeks ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Mar 30, 2018Updated 7 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- ☆14Nov 18, 2021Updated 4 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- ☆38Mar 4, 2020Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Security Monitoring Resolution Categories☆138Nov 25, 2021Updated 4 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year