Lists (1)
Sort Name ascending (A-Z)
Stars
A collection of awesome security hardening guides, tools and other resources
My personal infrastructure and Kubernetes cluster written as code.
📦 Make security testing of K8s, Docker, and Containerd easier.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Red Team Cheatsheet in constant expansion.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at analyst's disposal IP, domain, email, hash, files.
Tools & Interesting Things for RedTeam Ops
Inofficial Qualcomm Firehose / Sahara / Streaming / Diag Tools :)
Best practices for segmentation of the corporate network of any company
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
immudb - immutable database based on zero trust, SQL/Key-Value/Document model, tamperproof, data change history
Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or ma…
Complite Web Application Penetration Testing
This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machines and CTFs with examples.
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
DFIRTrack - The Incident Response Tracking Application
Red Teaming Tactics and Techniques
Red Teaming & Pentesting checklists for various engagements
Vagrant VirtualBox environment for conducting an internal network penetration test
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.