Public repository for Red Canary Research
☆38Oct 29, 2020Updated 5 years ago
Alternatives and similar repositories for public-research
Users that are interested in public-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Nov 28, 2024Updated last year
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Public Repo for Atomic Test Harness☆285Apr 8, 2025Updated last year
- Reverse/ Bind Shell Generator for cross platform systems☆17Sep 2, 2018Updated 7 years ago
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated last week
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- File helpers - Moved at https://github.com/projectdiscovery/utils☆14Oct 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- A PoC executing shellcode in Dart☆14Jun 28, 2022Updated 3 years ago
- ☆21Feb 20, 2014Updated 12 years ago
- Quick tool for using Hybrid Analysis API on command line..☆17Dec 20, 2017Updated 8 years ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆34Oct 15, 2025Updated 5 months ago
- ☆14Mar 5, 2021Updated 5 years ago
- a tiny program to consume from ETW providers for research☆55Jan 4, 2025Updated last year
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- List of OSINT Capture The Flag platforms☆45Mar 27, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- This batch script file wants to check your EDR systems detection and response capabilities in a more noisy way!☆12Jul 3, 2020Updated 5 years ago
- Collection of incidents resulting from caching issues☆29Jun 3, 2025Updated 10 months ago
- ☆65Jul 3, 2024Updated last year
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆21Oct 31, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- Web To App - Examples of how to port a Web or HTML5 game to a native Android, iOS and Mac OS X App☆15Oct 30, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago