Panagiotis-INS / Cyber-Defenders
This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges
☆17Updated last year
Alternatives and similar repositories for Cyber-Defenders:
Users that are interested in Cyber-Defenders are comparing it to the libraries listed below
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- Memory Scaner☆63Updated 2 years ago
- List of some AD tools I frequently use☆45Updated 2 months ago
- ☆39Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆123Updated 2 years ago
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Updated 9 months ago
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆44Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆39Updated 3 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- Evtx to Splunk ingestor☆15Updated 3 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆26Updated 10 months ago
- shared samples from #dailyphish and/or #apt tweets☆39Updated last month
- Some of my rough notes for Docker threat detection☆47Updated last year
- A testing Red Team Infrastructure created with Docker☆32Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- spring4shell | CVE-2022-22965☆21Updated 2 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆1Updated 10 months ago
- Volatility Explorer Suit☆63Updated 2 years ago
- ☆160Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆93Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆21Updated 8 months ago
- yara detection rules for hunting with the threathunting-keywords project☆116Updated last month
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- Exploits targeting vBulletin.☆76Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆54Updated last year
- PoC☆11Updated 2 weeks ago