mttaggart / security-toolsLinks
A very opinionated list of security tools
☆128Updated 6 months ago
Alternatives and similar repositories for security-tools
Users that are interested in security-tools are comparing it to the libraries listed below
Sorting:
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆245Updated last year
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 3 weeks ago
- List of past and future infosec related events.☆164Updated this week
- Pwnspoof repository☆264Updated 2 years ago
- ☆241Updated 7 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆403Updated 4 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 7 months ago
- Dredging up secrets from the depths of the file system☆131Updated 10 months ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆355Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆132Updated last year
- ☆185Updated last year
- SIEM Cheat Sheet☆76Updated 2 years ago
- ☆31Updated 2 years ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 8 months ago
- Knowledge base on cybercriminal concealment techniques☆76Updated 4 months ago
- God Mode Detection Rules☆134Updated last year
- Useful resources about phishing email analysis☆85Updated 7 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆149Updated 6 months ago
- A curated checklist of tasks to be done during engagements☆34Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆260Updated 3 months ago
- Automated security lab provisioning☆83Updated 2 weeks ago
- A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines☆38Updated last year
- CSbyGB PenTips Gitbook☆113Updated 3 weeks ago