trillium-infosec-systems / T-MONView external linksLinks
Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)
☆14Mar 27, 2024Updated last year
Alternatives and similar repositories for T-MON
Users that are interested in T-MON are comparing it to the libraries listed below
Sorting:
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- Chrome Logs Events and Protobuf Parser☆40Dec 13, 2022Updated 3 years ago
- ☆10Oct 9, 2024Updated last year
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Dec 25, 2024Updated last year
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Actual good v3 onion links☆14Jan 19, 2026Updated 3 weeks ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Updated this week
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 7 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- ☆11Nov 8, 2023Updated 2 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆10Jan 22, 2025Updated last year
- Packet Analysis on Steroids☆12Oct 20, 2022Updated 3 years ago
- A package that get baseball data☆13Feb 24, 2025Updated 11 months ago