infosecn1nja / awesome-threat-detectionLinks
A curated list of awesome threat detection and hunting resources
☆18Updated 6 years ago
Alternatives and similar repositories for awesome-threat-detection
Users that are interested in awesome-threat-detection are comparing it to the libraries listed below
Sorting:
- A curated list of Awesome Threat Intelligence resources☆17Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆15Updated 6 years ago
- Small and highly portable detection tests.☆12Updated 7 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆54Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 5 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆19Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆91Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 2 months ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 6 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆74Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- ADDS (Active Directory Domain Services)☆28Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 6 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆11Updated 8 years ago