Stars
Free hands-on digital forensics labs for students and faculty
🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…
A curated list of tools for incident response
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Trace Labs OSINT Linux Distribution based on Kali.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Malware samples, analysis exercises and other interesting resources.
This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR
Understand adversary tradecraft and improve detection strategies
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Web app that provides basic navigation and annotation of ATT&CK matrices
konwro / seccubus
Forked from seccubus/seccubusEasy automated vulnerability scanning, reporting and analysis
A curated list of the most common and most interesting robots.txt disallowed directories.
konwro / pentest-guide
Forked from zdresearch/pentest-guidePenetration tests guide based on OWASP including test cases, resources and examples.
konwro / dcim-list
Forked from little-brother/dcim-listList of DCIM (data center infrastructure management) software
Quick script to gather stats on incoming credentials and IPs for a honey listener.
A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more
konwro / CredSniper
Forked from ustayready/CredSniperCredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.
konwro / sparta
Forked from SECFORCE/spartaNetwork Infrastructure Penetration Testing Tool
Python program to steganography files into images using the Least Significant Bit.