Threat Mitigation Strategies
☆28Feb 18, 2026Updated 2 weeks ago
Alternatives and similar repositories for threat-mitigation
Users that are interested in threat-mitigation are comparing it to the libraries listed below
Sorting:
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Nov 19, 2024Updated last year
- ☆16Dec 20, 2021Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Exploit for HiveNightmare - CVE-2021–36934☆61Aug 22, 2025Updated 6 months ago
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 3 months ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- ☆50May 12, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- ☆55Sep 13, 2022Updated 3 years ago
- kernel to user mode APC injector☆46Mar 19, 2022Updated 3 years ago
- A repository of Labs and other information for learning how PowerShell can help with infosec☆17Nov 3, 2015Updated 10 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago