Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Stars
About Osintgraph is an open-source tool that collects Instagram data, followers, and followees, storing them in Neo4j. It helps you easily map and analyze a target's social network, revealing inter…
This repository contains the Hugging Face Agents Course.
Simple hunting script for suspicious M365 OAuth Apps
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities.
WebRTC/RTSP/RTMP/LL-HLS bridge for Wyze cams in a docker container
CAN Commander is a comprehensive tool designed for the reverse engineering of CAN (Controller Area Network) bus systems. This project aims to provide a robust platform for automotive enthusiasts, e…
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incident responders in identifying, containing, eradicating, and r…
A GPT-empowered penetration testing tool
An enterprise friendly way of detecting and preventing secrets in code.
This is a little plugin to copy disassembly in a way that is usable in YARA rules!
Monitor linux processes without root permissions
Redeye is a tool intended to help you manage your data during a pentest operation
An ergonomic and safe syscall interception framework for Linux.
Master the command line, in one page
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Microsoft Threat Intelligence Security Tools
The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clu…
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.
Your shell history: synced, queryable, and in context
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com