☆23Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for SEC599-Resources
Users that are interested in SEC599-Resources are comparing it to the libraries listed below
Sorting:
- Serverless AWS application to upload and hash evidence files.☆23Oct 26, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Jun 18, 2024Updated last year
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- This is a code repository for the LinkedIn Learning course OpenAI API: Introduction.☆10Jan 8, 2024Updated 2 years ago
- ☆13Mar 28, 2024Updated last year
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Returns a HTTP proxy server from a SOCKS5 proxy like Tor☆10Aug 4, 2018Updated 7 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- ☆41Aug 12, 2022Updated 3 years ago
- Run cmd or stand along server as windows service☆12Apr 25, 2022Updated 3 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- ☆11Jun 24, 2024Updated last year
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Wireguard Trust Network☆11Feb 10, 2021Updated 5 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Password manager and collaboration tool with multi-factor authentication and client-side encryption☆14Feb 24, 2026Updated last week
- A C++ library and tools providing easy access to the retdec.com decompilation service through their REST API.☆10Jun 17, 2018Updated 7 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Updated this week
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- A simple process query/manipulation tool using driver hooked system call. (2019)☆12Aug 30, 2021Updated 4 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Mar 17, 2025Updated 11 months ago
- ☆119Jun 17, 2021Updated 4 years ago
- Some Notes because i am too lazy to search☆12May 10, 2021Updated 4 years ago
- Our Game for the Global Game Jam 2012☆21Jan 20, 2014Updated 12 years ago
- Use Temp Mail in your Python code without an API key☆11Nov 26, 2023Updated 2 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- ☆12Jan 10, 2022Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago