- Houston, Texas
-
19:24
(UTC -05:00) - https://www.victimoftechnology.com
- @HMInfoSecViking
- in/brad-voris
- https://www.cybersecurityhowdoidoit.org/
Lists (2)
Sort Name ascending (A-Z)
Stars
CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +90 frameworks worldwide with auto-mapping: NIST CSF, ISO 27001, SOC2, CIS, PCI…
Addon for World of Warcraft, does combat analyzes offering clean visual data for the player
Microsoft Integration, Azure, Power Platform, Office 365 and much more Stencils Pack it’s a Visio package that contains fully resizable Visio shapes (symbols/icons) that will help you to visually r…
A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
Jupyter notebooks for teaching/learning Python 3
audible feedback on just how much your browsing feeds into google
Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews.
Tooling for assessing an Azure AD tenant state and configuration
PowerShell module to run a Selenium WebDriver.
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
A collection of materials related to my certification videos
PowerShell runner for executing malicious payloads in order to bypass Windows Defender.
PowerShell script that can Exfiltrate data using ICMP - POC
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
A collective list of public APIs for use in security. Contributions welcome
HTML Agility Pack implementation in Powershell for parsing and manipulating HTML
A spectrum analyzer display for the PET/C64 driven by an M5Stick on the USERPORT
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)
UI, API, and Scanner (Rules Engine) services for Merry Maker
Module to compile powershell scripts to executables