Srinivas11789 / SecurityNuggets
Computer Security Nuggets -- > Ctf writeups + Explore, Research, Study, Fun and Learning Security
☆3Updated last month
Alternatives and similar repositories for SecurityNuggets:
Users that are interested in SecurityNuggets are comparing it to the libraries listed below
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- ☆14Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- ☆22Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Hashes of infamous malware☆26Updated last year
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- ☆20Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- ☆33Updated 3 months ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Presentation materials for talks I've given.☆20Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 9 months ago
- Work in Progress repo☆14Updated 6 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago