R1ngZer0 / Packt-Conferences-Put-GenAI-to-Work
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Packt-Conferences-Put-GenAI-to-Work
- Mastering Azure Security, published by Packt☆15Updated 2 years ago
- AI Security Research☆8Updated last year
- Create an AMI with CobaltStrike and related tools.☆8Updated 3 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 8 months ago
- run process as PPL Antimalware☆11Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 5 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆22Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 3 months ago
- This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecuri…☆17Updated this week
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆12Updated 2 weeks ago
- Tool for obtaining information about PPL processes☆17Updated 9 months ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆24Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆10Updated last year
- This repository contains generated contextual data utilized by pyattck.☆17Updated 4 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 3 years ago
- Mastering Identity and Access Management with Microsoft Azure-Second Edition, published by Packt☆16Updated 3 years ago
- Info on how to use Kerberos KDC on a non-domain joined host☆37Updated 3 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 4 months ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- ☆27Updated last year
- Lets you write arbitrary registry entries to Group Policy related .pol files (e.g. registry.pol)☆11Updated 5 years ago
- redteamrecipe.com☆21Updated 9 months ago
- A dataset of phishing kits in the wild☆15Updated 5 months ago
- MalDev & AV-EDR Evasion for Pentesters☆12Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated last week
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year