Lists (1)
Sort Name ascending (A-Z)
Stars
Ollama's Interactive Prompt Engineering Tutorial
EDR & Antivirus Bypass to Gain Shell Access
An open-source RAG-based tool for chatting with your documents.
This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273
Slide decks from my conference presentations
AI-Crash-Course, published by Packt
Interact with your documents using the power of GPT, 100% privately, no data leaks
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.
A guide on how to write fast and memory friendly YARA rules
Adversary Tactics - PowerShell Training
SCADA StrangeLove Default/Hardcoded Passwords List
Tools, tips, tricks, and more for exploring ICS Security.
Using nmap NSE scripts for identifying common ICS protocols[使用nmap的nse脚本对常见工控协议进行识别,附对应nse脚本,并记录pcap流量]
Some notes and examples for cobalt strike's functionality
Best practices for segmentation of the corporate network of any company
HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907
Wiki to collect Red Team infrastructure hardening resources
An active directory laboratory for penetration testing.
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker on your journey.
Great List of Resources to Build an Enterprise Grade Home Lab
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
A not so awesome list of malware gems for aspiring malware analysts
Python script that allows offline parsing of Cisco ASA firewall rules