shellsharks / assortedLinks
☆14Updated 11 months ago
Alternatives and similar repositories for assorted
Users that are interested in assorted are comparing it to the libraries listed below
Sorting:
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆48Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆46Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆44Updated 2 months ago
- ☆29Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 5 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆63Updated 4 years ago
- ☆49Updated 4 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- ☆80Updated 2 years ago
- ☆44Updated 6 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Kerberoast Detection Script☆31Updated last year
- Graphical map of known Advanced Persistent Threats☆62Updated this week
- ☆80Updated 6 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 4 years ago
- Command-line tool to search for malware samples in various repositories☆12Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆33Updated 3 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆47Updated 6 years ago
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago