Srinivas11789 / SecurityNuggetsLinks
Computer Security Nuggets -- > Ctf writeups + Explore, Research, Study, Fun and Learning Security
☆3Updated last week
Alternatives and similar repositories for SecurityNuggets
Users that are interested in SecurityNuggets are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆28Updated 5 months ago
- ☆12Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- ☆10Updated 4 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated last week