techspence / HackerArt
A collection of art inspired by the world of cybersecurity and hacking culture.
☆30Updated 6 months ago
Related projects: ⓘ
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- CarbonBlack EDR detection rules and response actions☆70Updated last week
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆23Updated 2 months ago
- Automatically run and populate a new instance of BH CE☆41Updated 2 weeks ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆91Updated 3 weeks ago
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆110Updated 4 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- ☆21Updated this week
- DEFCON 31☆57Updated 2 months ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆21Updated 3 weeks ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆31Updated last month
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆67Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆40Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 4 months ago
- ☆31Updated 5 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆93Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- ☆48Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆23Updated 2 weeks ago
- ☆22Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆12Updated 2 months ago
- Parses USB connection artifacts from offline Registry hives☆50Updated last week
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- A collection of tools, scripts and personal research☆104Updated 2 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆73Updated last month
- Baseline a Windows System against LOLBAS☆22Updated 4 months ago
- ☆34Updated 5 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆74Updated 3 weeks ago
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆22Updated 3 weeks ago