Panagiotis-INS / Cyber-DefendersView external linksLinks
This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges
☆18Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber-Defenders
Users that are interested in Cyber-Defenders are comparing it to the libraries listed below
Sorting:
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- Leetcode solutions☆15Dec 24, 2025Updated last month
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 2 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- 安全基线☆19Jul 23, 2021Updated 4 years ago
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- ☆22Mar 14, 2024Updated last year
- ☆30Jan 13, 2023Updated 3 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Sep 21, 2024Updated last year
- ☆24Mar 8, 2017Updated 8 years ago
- 《FanZhi-攻击与反制的艺术》☆67Dec 8, 2023Updated 2 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- 为CTF而生,随机或穷举指定格式HASH值,支持Fuzz MD系列、SHA系列等常见HASH类型☆66May 2, 2023Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆32May 25, 2024Updated last year
- 🔑 Simple MinIO access and secret key generator☆36Dec 19, 2021Updated 4 years ago
- Java library used to upload files following the security steps described by OWASP☆10Jun 7, 2021Updated 4 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Erised Reverse Engineering and Exploitation Training Sessions☆37Feb 12, 2016Updated 10 years ago
- A high throughput GC-MS analysis pipeline built on the Python PyMS library☆11Feb 12, 2018Updated 8 years ago
- CLI generator for Velociraptor offline collector☆15Oct 10, 2025Updated 4 months ago
- ☆10May 30, 2025Updated 8 months ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆11Sep 3, 2021Updated 4 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆15Jul 16, 2024Updated last year
- Hunt the windows Registry automatically using VQL☆13Jan 6, 2026Updated last month
- ☆12Aug 22, 2017Updated 8 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆14Jul 19, 2025Updated 6 months ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- 申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。☆12May 21, 2024Updated last year
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆54Jul 12, 2022Updated 3 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 3 months ago
- The easiest way to embed static files into a binary file in your Golang app (no external dependencies).☆47Nov 8, 2021Updated 4 years ago
- Advanced detection of port scanning, DoS and malware attacks using Machine Learning techniques☆14May 18, 2023Updated 2 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 5 months ago
- ☆14Mar 5, 2021Updated 4 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated last year