Jean-Francois-C / Threat-Detection-and-Incident-Response
Collection of notes, useful resources, list of tools and scripts related to threat detection, digital forensics and incident response.
☆11Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Threat-Detection-and-Incident-Response
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated 9 months ago
- ☆50Updated 7 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 8 months ago
- ☆35Updated 11 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆29Updated 9 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 3 months ago
- Cobalt Strike BOFS☆16Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 4 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆43Updated 5 months ago
- ☆13Updated 7 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 4 months ago
- Fortinet FortiClient EMS SQL Injection☆43Updated 8 months ago
- ☆25Updated last year
- ☆55Updated 7 months ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆23Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- Fast Path Traversal exploitation tool☆21Updated 7 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 8 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆23Updated 4 months ago
- 🌩️ Collection of BloodHound queries for Azure☆44Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Updated 9 months ago
- ☆25Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆24Updated 11 months ago