PwnDefend / wallpapers
☆12Updated 2 years ago
Alternatives and similar repositories for wallpapers:
Users that are interested in wallpapers are comparing it to the libraries listed below
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆40Updated 4 years ago
- ☆95Updated 3 months ago
- ☆77Updated 5 years ago
- ☆41Updated 5 years ago
- A repo to support the book☆104Updated 3 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated 6 months ago
- ☆186Updated last year
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 9 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- Understanding and analyzing carrier files workshop repo☆48Updated 5 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆172Updated 3 years ago
- ☆51Updated 6 years ago
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 4 years ago
- ☆20Updated 5 years ago
- Python API for interacting with sigma rules.☆49Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- ☆46Updated last month
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆34Updated 3 years ago
- Fraktal's Ransomware Emulator☆101Updated 9 months ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆81Updated 2 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- ☆68Updated 3 years ago
- ☆63Updated 3 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 3 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago