dbissell6 / DFIR
This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.
☆37Updated this week
Related projects: ⓘ
- Completely Risky Active-Directory Simulation Hub☆99Updated 10 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆131Updated this week
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆101Updated 10 months ago
- some of the commands I usually use when doing HTB machines☆34Updated 8 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆89Updated last month
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆135Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆116Updated last year
- Obsidian Templates for OSCP, CPTS, Pentesting, and Wargames☆58Updated 4 months ago
- OSCP notes, commands, tools, and more.☆76Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆74Updated 7 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆84Updated 5 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆55Updated 10 months ago
- Just some lists of Malware Configs☆158Updated 3 weeks ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆92Updated last month
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆53Updated last year
- Powershell tools used for Red Team / Pentesting.☆73Updated 8 months ago
- ☆63Updated last year
- ☆40Updated 10 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆172Updated 2 months ago
- ☆145Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆125Updated 8 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆35Updated 10 months ago
- Deny list generator for password filters☆25Updated last month
- Some important DFIR Resources☆81Updated last year
- Scripts for offensive security☆59Updated 3 weeks ago
- Creation of a laboratory for malware analysis in AWS☆84Updated last year
- ☆140Updated last week
- OSCP Methodology☆36Updated last year
- Lab used for workshop and CTF☆82Updated this week