☆15Jan 10, 2019Updated 7 years ago
Alternatives and similar repositories for OSCP
Users that are interested in OSCP are comparing it to the libraries listed below
Sorting:
- Some bash to make life easier after a new kali install..☆34Dec 11, 2022Updated 3 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- A project to maintain the list of CrowdStrike Falcon IP addressing for use in dynamic objects/lists on firewalls☆23Dec 8, 2021Updated 4 years ago
- SPL cheatsheet for Splunk.☆26Dec 2, 2022Updated 3 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- ☆16Jan 20, 2026Updated last month
- Random notes collected on the intertubes relating to DFIR☆35Jun 26, 2023Updated 2 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 9 years ago
- This is a python script that can be run on each Splunk Indexer for the purpose of exporting historical bucket data (raw events + metadata…☆12Jan 31, 2024Updated 2 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- One command to update all your repos☆10Feb 24, 2024Updated 2 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- A solution to integrate a remote Langgraph server with Open-Webui Pipelines☆20Sep 7, 2025Updated 6 months ago
- ☆16Jun 1, 2018Updated 7 years ago
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆15Mar 17, 2025Updated 11 months ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- "Locks" your MacBook using your charging cable – an alarm is played if unplugged, not more...☆12Jul 25, 2018Updated 7 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/malwarecookbook☆42May 25, 2015Updated 10 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- Pulsar Registry Frontend for Community Packages☆13Feb 15, 2026Updated 3 weeks ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 8 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Let's Encrypt Revocation Event☆13Mar 5, 2020Updated 6 years ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆15Apr 14, 2025Updated 10 months ago