Kill Chain Matrix -->>
☆38Jun 17, 2019Updated 6 years ago
Alternatives and similar repositories for ReverseKillChain
Users that are interested in ReverseKillChain are comparing it to the libraries listed below
Sorting:
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- FRAC and RIFT☆17Mar 16, 2019Updated 6 years ago
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- Files to build Docker image of Capture the Flags (CTF) game☆19Jan 25, 2018Updated 8 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Jul 28, 2017Updated 8 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- ☆23Mar 25, 2019Updated 6 years ago
- My network monitoring solution and tools that go along with it.☆61Jan 21, 2022Updated 4 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- Incident Response Hierarchy of Needs☆472Apr 19, 2023Updated 2 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- This is a list of Computer and Network Security Axioms☆30May 1, 2020Updated 5 years ago
- Personal settings for X-Ways Forensics☆32Apr 28, 2022Updated 3 years ago
- My public exploit collection.☆31Oct 23, 2018Updated 7 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Nov 9, 2019Updated 6 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC, ISO 14443 and ISO 15693. It has been designed and maint…☆36Apr 5, 2014Updated 11 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- DEFCON 26 Flying Skull Badge☆13Jun 6, 2021Updated 4 years ago
- Different DFIR and CTI utilities☆39May 13, 2020Updated 5 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Jul 30, 2017Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- PowerShell script to report the membership of Exchange RBAC role groups☆10Oct 21, 2018Updated 7 years ago
- ☆12Nov 15, 2021Updated 4 years ago