Skip to content
View joeltyy's full-sized avatar
🫡
🫡

Block or report joeltyy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Because AV evasion should be easy.

Go 816 80 Updated Nov 28, 2024

Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍

Python 219 24 Updated Aug 21, 2025

Windows Events Attack Samples

HTML 2,428 419 Updated Jan 24, 2023

An informational repo about hunting for adversaries in your IT environment.

1,822 386 Updated Nov 17, 2021

Rapidly Search and Hunt through Windows Forensic Artefacts

Rust 3,323 294 Updated Oct 12, 2025

Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.

Python 205 26 Updated Oct 9, 2025

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

Rust 2,871 251 Updated Oct 12, 2025

Mapping of open-source detection rules and atomic tests.

177 24 Updated Jan 18, 2025

A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.

199 15 Updated Oct 29, 2024

The Hunting ELK

Jupyter Notebook 3,887 700 Updated Jun 1, 2024

The Elastic stack (ELK) powered by Docker and Compose.

Shell 18,134 6,980 Updated Oct 12, 2025

Elastic Security detection content for Endpoint

YARA 1,304 148 Updated Oct 14, 2025

Gandcrab v5.2 decryption scripts

Python 15 6 Updated Jan 10, 2020

A list of free and open forensics analysis tools and other resources

1,464 191 Updated Apr 20, 2025

Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.

Batchfile 152,298 14,732 Updated Sep 30, 2025

Microsoft Software Download Listing

JavaScript 1,003 110 Updated Sep 30, 2025

Automated Adversary Emulation Platform

Python 6,479 1,237 Updated Oct 14, 2025

The Browser Exploitation Framework Project

JavaScript 10,487 2,314 Updated Oct 10, 2025

The Havoc Framework

Go 7,882 1,126 Updated Jul 10, 2025

CTF framework and exploit development library

Python 12,964 1,779 Updated Oct 12, 2025

Adversary Emulation Framework

Go 10,102 1,372 Updated Oct 13, 2025

Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/

Go 1,787 224 Updated Jan 6, 2023

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

Go 5,403 845 Updated Apr 17, 2025

Ghidra is a software reverse engineering (SRE) framework

Java 61,273 6,802 Updated Oct 8, 2025

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

PowerShell 7,881 1,038 Updated Sep 17, 2025

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]

PowerShell 7,384 1,333 Updated Sep 24, 2024

FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.

Python 3,733 495 Updated Oct 13, 2025

Main Sigma Rule Repository

Python 9,703 2,436 Updated Oct 15, 2025

🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

C++ 50,721 2,246 Updated Oct 15, 2025
Next