Neo23x0 / LOLSecIssues
Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.
☆57Updated 10 months ago
Related projects: ⓘ
- All kinds of tiny shells☆59Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆105Updated 3 months ago
- Signature based honeypot detector tool written in Golang☆74Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆132Updated last week
- Canary Detection☆159Updated 5 months ago
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆164Updated 2 weeks ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆100Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆91Updated 3 weeks ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- ☆40Updated 3 weeks ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- DEFCON 31☆57Updated 2 months ago
- Generate graphs and charts based on password cracking result☆152Updated last year
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆91Updated 2 months ago
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆159Updated 5 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆121Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- Ping-based Information Lookup and Outbound Transfer☆70Updated 5 months ago
- God Mode Detection Rules☆130Updated last month
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 4 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆52Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆200Updated 9 months ago
- ☆23Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆54Updated this week
- tool for identifying guest relationships between companies☆83Updated 2 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆51Updated last month