Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.
☆58Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for LOLSecIssues
Users that are interested in LOLSecIssues are comparing it to the libraries listed below
Sorting:
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- An opensource sigma conversion tool built using pysigma☆161Feb 9, 2026Updated 3 weeks ago
- Powershell and python utilties for Entra Connect☆28Jun 5, 2025Updated 9 months ago
- Erku is an IPTV and video on demand client for the Roku OS.☆12Dec 29, 2024Updated last year
- ☆39Sep 26, 2022Updated 3 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- The backend server handling API requests and task management☆56Updated this week
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆63Feb 22, 2026Updated last week
- Event Tracing for Windows EDR bypass in Rust (usermode)☆39Jun 9, 2024Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 8 months ago
- 🐍 High-performance, multi-threaded YARA & IOC scanner☆272Updated this week
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆138Sep 28, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- ☆66Sep 1, 2023Updated 2 years ago
- ☆189Jan 23, 2024Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- ☆75Apr 3, 2025Updated 11 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆144Feb 2, 2026Updated last month
- Repository of Microsoft Driver Block Lists based off of OS-builds☆43Apr 14, 2024Updated last year
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆36Apr 25, 2022Updated 3 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated last month
- POCs to test Vlang in cybersecurity aspects.☆37Dec 29, 2022Updated 3 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A modern web interface for managing Google Cloud Platform emulator services 🎮☆36Updated this week
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- Бот для пересылки сообщений из MAX в Telegram☆40Feb 11, 2026Updated 3 weeks ago
- 91-95 Jeep and Dodge EPROMS☆13Nov 25, 2025Updated 3 months ago
- Scripts and things.☆13Jan 23, 2026Updated last month