paulveillard / cybersecurity-exploit-development
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆23Updated 2 years ago
Alternatives and similar repositories for cybersecurity-exploit-development:
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 2 years ago
- ☆17Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- C2Matrix Automation☆12Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- Enumeration & fingerprint tool☆24Updated 11 months ago
- New Framework Red Team Operations☆17Updated 3 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆39Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Linux and windows privilege escalation cheatsheet☆11Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- ☆18Updated last year
- ☆22Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- Red Team Server (RTS)☆16Updated 11 months ago
- Tactics, Techniques, and Procedures☆25Updated 3 weeks ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆40Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- ☆18Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 7 months ago
- ☆33Updated last month