The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.
☆25Nov 11, 2018Updated 7 years ago
Alternatives and similar repositories for gse-study
Users that are interested in gse-study are comparing it to the libraries listed below
Sorting:
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- ☆42Dec 13, 2020Updated 5 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- ☆14Sep 15, 2016Updated 9 years ago
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- Mirror network traffic from one interface to another on Windows☆25Feb 26, 2020Updated 6 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Apr 18, 2018Updated 7 years ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- This script is used to generate some basic detections of the aws security services☆72Feb 21, 2022Updated 4 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- ☆13Mar 29, 2021Updated 4 years ago
- Pressgang DocBook styles, fonts, ...☆18Aug 11, 2016Updated 9 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Reference page to my DEF CON 28 presentation.☆17Jul 30, 2020Updated 5 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆86Oct 23, 2020Updated 5 years ago
- Custom Nessus Plugins☆17Feb 18, 2014Updated 12 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 5 months ago
- Tool (CLI) for using haveibeenpwned through its API (only passwords for now)☆11Apr 26, 2018Updated 7 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Responsive Command and Control System☆102Oct 6, 2022Updated 3 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- ☆41May 16, 2018Updated 7 years ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- Indexes for SANS Courses and GIAC Certifications☆280May 26, 2024Updated last year