The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings the result of the defensive security analysis with an offensive mindset performed in the execution many different Malwares in our lab environment.
☆19Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- WordPress Auto Poster☆10Jun 14, 2019Updated 6 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆11Nov 19, 2024Updated last year
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆16Mar 3, 2024Updated 2 years ago
- MIDA: A Tool for Measuring the Internet☆20Mar 7, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆19Mar 22, 2026Updated last week
- SpyCore - Windows Malicious FIle Scanner (Distributes)☆14Jun 10, 2023Updated 2 years ago
- https://www.youtube.com/watch?v=qsjGj_L1kyo☆10Jul 29, 2021Updated 4 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Powershell script to automate finding privilege escalation vectors in windows environments.☆16Nov 30, 2019Updated 6 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆15Aug 7, 2021Updated 4 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆231Feb 24, 2022Updated 4 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- ☆15Mar 21, 2025Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🛡️ Master the essentials of SOC/Security Analysis with our 12-day SOC Analyst Prerequisites Learning Path, covering Linux, Windows, netw…☆24Oct 12, 2024Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago
- Home of https://redteam.guide☆15Updated this week
- Basic python client implementation of TDAmeritrade API☆31Feb 25, 2018Updated 8 years ago
- [DEPRECIATED] All writeups are moved to my main website☆14Mar 15, 2024Updated 2 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- An open-source security monitoring solution for Kubernetes Clusters☆43Nov 17, 2023Updated 2 years ago
- A landing page for great justice☆21Sep 1, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A concise cheatsheet for using Regular Expressions in JavaScript☆16Jan 30, 2021Updated 5 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Bash Shell Scripting for Pentesters, published by Packt☆49Updated this week
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- CISCO configuration guides☆14Feb 16, 2020Updated 6 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago