chrissistrunk / SecurityAxiomsLinks
This is a list of Computer and Network Security Axioms
☆30Updated 5 years ago
Alternatives and similar repositories for SecurityAxioms
Users that are interested in SecurityAxioms are comparing it to the libraries listed below
Sorting:
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- ☆113Updated 8 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 5 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆91Updated 8 months ago
- ☆16Updated 8 years ago
- ☆54Updated 5 years ago
- ☆53Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- gpocheck☆30Updated last year
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- first commit☆20Updated 3 months ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- Lutech TMS EHAT-NG☆14Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- ☆97Updated 9 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- ☆25Updated 9 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago