Threat Detection Engineering 101 Project
☆19Oct 17, 2024Updated last year
Alternatives and similar repositories for tde101
Users that are interested in tde101 are comparing it to the libraries listed below
Sorting:
- CTF writeups☆16Nov 20, 2025Updated 3 months ago
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- Courier 信使,自用应急响应信息收集脚本,便于快速进行信息收集、定位攻击信息。☆19Oct 16, 2024Updated last year
- Creation of a laboratory for malware analysis in AWS☆108Dec 5, 2022Updated 3 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆125Aug 19, 2025Updated 6 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- a small wiper malware programmed in c#☆59Nov 17, 2022Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆73Jun 11, 2024Updated last year
- Shellcode injection using the Windows Debugging API☆171Jan 4, 2026Updated 2 months ago
- KittyLoader is a highly evasive loader written in C / Assembly☆258Sep 22, 2025Updated 5 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆167Apr 17, 2023Updated 2 years ago
- A tool for mapping cyber crime☆236Jan 24, 2026Updated last month
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆204Mar 6, 2025Updated last year
- A collection oneliner scripts for bug bounty☆186Mar 21, 2024Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated 11 months ago
- This tracking tool can provide information about the phone number you enter. Not only that, this tool is able to scan telephone numbers w…☆225Jul 4, 2025Updated 8 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆264May 15, 2025Updated 9 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆222Mar 16, 2025Updated 11 months ago
- Welcome to the Cybersecurity Career Accelerator Repository! This repository is tailored to help aspiring cybersecurity professionals prep…☆337Oct 1, 2025Updated 5 months ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. With repository stars⭐ and forks…☆275Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,142Dec 19, 2025Updated 2 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆300Nov 22, 2025Updated 3 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆296Dec 18, 2025Updated 2 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆313Nov 4, 2025Updated 4 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆395Jan 29, 2026Updated last month
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆360Aug 11, 2024Updated last year
- Ultimate Burp Suite Exam and PortSwigger Labs Guide.☆379Aug 20, 2025Updated 6 months ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Sep 29, 2025Updated 5 months ago
- Social Recon☆414Dec 7, 2022Updated 3 years ago
- groceri.es is a recipe manager and meal planning tool☆390May 21, 2024Updated last year
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆443Jul 10, 2024Updated last year
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,517Jan 5, 2026Updated 2 months ago
- Finance Management Made Easy☆426Oct 31, 2024Updated last year
- The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)☆472May 20, 2023Updated 2 years ago
- Signtool for expired certificates☆515Jun 10, 2023Updated 2 years ago
- Protection against Model Serialization Attacks☆647Feb 18, 2026Updated 2 weeks ago