infosecn1nja / awesome-threat-detectionLinks
A curated list of awesome threat detection and hunting resources
☆20Updated 6 years ago
Alternatives and similar repositories for awesome-threat-detection
Users that are interested in awesome-threat-detection are comparing it to the libraries listed below
Sorting:
- A curated list of Awesome Threat Intelligence resources☆19Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago
- Wiki to collect Red Team infrastructure hardening resources☆19Updated 7 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆87Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Small and highly portable detection tests.☆13Updated 7 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last month
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12Updated 8 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 2 months ago
- Notes and Commands for CTFs☆22Updated 5 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Updated 6 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago