☆21Jan 11, 2022Updated 4 years ago
Alternatives and similar repositories for threat-recognition
Users that are interested in threat-recognition are comparing it to the libraries listed below
Sorting:
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- This project is a vulnerable web application to practice on. It is designed for educational purposes to help security enthusiasts and dev…☆19Feb 21, 2024Updated 2 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- ☆48May 12, 2021Updated 4 years ago
- Performant parser for textual data (CSV parser)☆34Oct 28, 2018Updated 7 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- ☆26Jul 2, 2020Updated 5 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 4 months ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- Study and research with your docs, media, and AI in one place☆33Updated this week
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- ☆41Mar 23, 2023Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- ☆13Nov 5, 2024Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 6 years ago
- Analysis and manipulation of extended attribute ($EA) on NTFS☆38Jul 27, 2015Updated 10 years ago
- A minimal provisioning agent designed for Azure Linux VMs.☆15Feb 18, 2026Updated 2 weeks ago
- Kernel source build instructions and scripts for the ARK Jetson Carrier☆14Updated this week
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- Gameboy for the Thumby☆12Jan 12, 2022Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- 【Every star you give feeds a hungry developer's motivation!⭐️】A Model Context Protocol (MCP) server implementation that provides Google J…☆19Feb 24, 2026Updated last week
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- Yet another tool to search through your (exported) ChatGPT conversations☆13Dec 24, 2025Updated 2 months ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 5 years ago