A quick bash script that I created in order to speed up the creation of usable kali boxes.
☆11Oct 29, 2021Updated 4 years ago
Alternatives and similar repositories for kali-setup
Users that are interested in kali-setup are comparing it to the libraries listed below
Sorting:
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- CLI Frontend for PowerShell Empire.☆49Jun 26, 2021Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆26Jun 22, 2022Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆35Feb 17, 2021Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Apr 13, 2020Updated 5 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago