Kill Chain Matrix -->>
☆38Jun 17, 2019Updated 6 years ago
Alternatives and similar repositories for ReverseKillChain
Users that are interested in ReverseKillChain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆63Oct 7, 2024Updated last year
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- Incident Response Hierarchy of Needs☆473Apr 19, 2023Updated 2 years ago
- Coreboot payload for PC Engines APU2 that sort boot order and save it to flash.☆15May 30, 2025Updated 9 months ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆80Aug 12, 2018Updated 7 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Personal settings for X-Ways Forensics☆32Apr 28, 2022Updated 3 years ago
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Monitors Twitter for new tweets with filter capabilities, lightning-fast using Tweepy's Stream API☆11Jul 27, 2019Updated 6 years ago
- TextMate support for Ini☆15Jun 9, 2022Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Lightweight File Integrity Monitoring Tool☆33Apr 20, 2024Updated last year
- mirror of seabios☆12May 30, 2025Updated 9 months ago
- Utilities and scripts for bro-ids☆23Jan 6, 2014Updated 12 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Nov 9, 2019Updated 6 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- This is a list of Computer and Network Security Axioms☆30May 1, 2020Updated 5 years ago
- Tiny Honeypot☆19Aug 9, 2013Updated 12 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Jul 30, 2017Updated 8 years ago
- FRAC and RIFT☆17Mar 16, 2019Updated 7 years ago
- my goto docker image when playing ctfs with all the tools I need☆21Mar 8, 2026Updated 2 weeks ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- ☆15Mar 10, 2020Updated 6 years ago
- Simple Ansible playbook and role for setting a software channel and upgrading RouterOS on mikrotik devices☆12Aug 1, 2022Updated 3 years ago