Neo23x0 / LOLSecIssues
Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.
☆57Updated last year
Alternatives and similar repositories for LOLSecIssues:
Users that are interested in LOLSecIssues are comparing it to the libraries listed below
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Signature based honeypot detector tool written in Golang☆89Updated last week
- ☆70Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 3 months ago
- Canary Detection☆164Updated 11 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago
- ☆40Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 2 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆83Updated 4 months ago
- ☆74Updated last week
- DFIR ORC PARSER PROJECT☆25Updated 3 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 4 months ago
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 10 months ago
- ☆24Updated 2 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- create a "simulated internet" cyber range environment☆15Updated last week
- Living Off Security Tools☆45Updated 4 months ago
- VirtualGHOST Detection Tool☆90Updated 10 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated last month
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆32Updated 7 months ago
- The core backend server handling API requests and task management☆37Updated last week
- Track C2 servers, tools, and botnets over time by framework and location☆37Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month