techspence / HackerArt
A collection of art inspired by the world of cybersecurity and hacking culture.
☆31Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for HackerArt
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- Baseline a Windows System against LOLBAS☆25Updated 7 months ago
- ☆76Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- ☆24Updated last year
- DEFCON 31 slide deck and video link☆57Updated 4 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆24Updated 4 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆103Updated 3 months ago
- ☆31Updated this week
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated last month
- ☆36Updated 7 months ago
- ☆72Updated this week
- Detection rule validation☆41Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- A collection of tools, scripts and personal research☆114Updated 4 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆50Updated 2 years ago
- Living Off Security Tools☆41Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 3 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆12Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆111Updated 7 months ago
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆113Updated this week
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆39Updated 3 weeks ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆29Updated last week
- Yara Rules for Modern Malware☆68Updated 8 months ago
- Companion content for my 'Fun with Office Macros' webcast.☆22Updated 7 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 4 months ago