Really fast knock up use at own risk etc.
☆18Mar 10, 2021Updated 5 years ago
Alternatives and similar repositories for ExchangeMarch2021IOCHunt
Users that are interested in ExchangeMarch2021IOCHunt are comparing it to the libraries listed below
Sorting:
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- PhishReporter Outlook Add-In in an Outlook Add-In that allows users to report phishing e-mails to a specific e-mail address for further p…☆35Jan 25, 2017Updated 9 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- post-quantum email encryption with CodeCrypt☆11Feb 23, 2018Updated 8 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Scripts which don't yet warrant their own repo☆11Oct 31, 2018Updated 7 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago
- Platform for sharing complex information about security forces. Powers WhoWasInCommand.com☆10Mar 1, 2024Updated 2 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- helper encrypt data☆10Updated this week
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- Extensible MacOS system telemetry generator.☆53Mar 1, 2026Updated last week
- ☆10Nov 21, 2023Updated 2 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated 2 weeks ago
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago