Skip to content
View joeltyy's full-sized avatar
🫡
🫡

Block or report joeltyy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡

Python 21,026 1,394 Updated Mar 5, 2025

🤖 The Modern Port Scanner 🤖

Rust 19,209 1,286 Updated Feb 13, 2026

Because AV evasion should be easy.

Go 857 83 Updated Nov 28, 2024

Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍

Python 262 27 Updated Jan 20, 2026

Windows Events Attack Samples

HTML 2,507 428 Updated Jan 24, 2023

An informational repo about hunting for adversaries in your IT environment.

1,847 391 Updated Nov 17, 2021

Rapidly Search and Hunt through Windows Forensic Artefacts

Rust 3,442 298 Updated Oct 12, 2025

Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.

Python 214 26 Updated Feb 13, 2026

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

Rust 3,019 256 Updated Feb 13, 2026

Mapping of open-source detection rules and atomic tests.

195 25 Updated Feb 10, 2026

A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.

207 16 Updated Feb 7, 2026

The Hunting ELK

Jupyter Notebook 3,910 700 Updated Jun 1, 2024

The Elastic stack (ELK) powered by Docker and Compose.

Shell 18,300 6,966 Updated Feb 5, 2026

Elastic Security detection content for Endpoint

YARA 1,372 152 Updated Feb 12, 2026

Gandcrab v5.2 decryption scripts

Python 16 6 Updated Jan 10, 2020

A list of free and open forensics analysis tools and other resources

2,121 283 Updated Apr 20, 2025

Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.

Batchfile 165,983 15,973 Updated Feb 1, 2026

Microsoft Software Download Listing

JavaScript 1,168 119 Updated Sep 30, 2025

Automated Adversary Emulation Platform

Python 6,745 1,286 Updated Feb 13, 2026

The Browser Exploitation Framework Project

JavaScript 10,719 2,342 Updated Feb 12, 2026

The Havoc Framework

Go 8,158 1,170 Updated Dec 18, 2025

CTF framework and exploit development library

Python 13,254 1,817 Updated Feb 14, 2026

Adversary Emulation Framework

Go 10,683 1,452 Updated Feb 13, 2026

Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/

Go 1,782 227 Updated Jan 6, 2023

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

Go 5,504 849 Updated Apr 17, 2025

Ghidra is a software reverse engineering (SRE) framework

Java 64,349 7,134 Updated Feb 12, 2026

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

PowerShell 8,347 1,071 Updated Dec 23, 2025

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com

PowerShell 7,524 1,343 Updated Oct 16, 2025

FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.

Python 3,876 516 Updated Feb 3, 2026
Next