Skip to content
View konwro's full-sized avatar

Block or report konwro

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Free hands-on digital forensics labs for students and faculty

Jupyter Notebook 2,421 527 Updated Feb 10, 2026

🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.

Python 388 61 Updated Apr 3, 2024

Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…

PowerShell 1,299 260 Updated Jun 1, 2023

A curated list of tools for incident response

8,809 1,645 Updated Jul 18, 2024

This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.

2,802 557 Updated Sep 17, 2024

Trace Labs OSINT Linux Distribution based on Kali.

HTML 789 118 Updated Aug 20, 2023

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

206,213 12,414 Updated Nov 19, 2024

yarGen is a generator for YARA rules

Python 1,772 308 Updated Jan 10, 2026

Main Sigma Rule Repository

Python 10,114 2,541 Updated Feb 13, 2026

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 75,180 16,622 Updated Feb 2, 2026

Malware samples, analysis exercises and other interesting resources.

HTML 1,608 235 Updated Jan 13, 2024

This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR

85 32 Updated Mar 3, 2022

Understand adversary tradecraft and improve detection strategies

PowerShell 712 76 Updated Mar 9, 2023

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 2,070 357 Updated May 28, 2025

🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.

Python 498 89 Updated Apr 3, 2024

Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet

5,446 1,258 Updated Dec 12, 2024

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

Python 14,546 3,308 Updated Oct 21, 2024

Web app that provides basic navigation and annotation of ATT&CK matrices

TypeScript 2,324 675 Updated Feb 7, 2026

A terminal UI for tshark, inspired by Wireshark

Go 9,808 433 Updated Apr 30, 2024

Web and API based SMTP testing

Go 15,756 1,153 Updated Feb 13, 2024

Easy automated vulnerability scanning, reporting and analysis

JavaScript 1 Updated Jan 10, 2020

A curated list of the most common and most interesting robots.txt disallowed directories.

Shell 1 Updated Dec 1, 2019

Penetration tests guide based on OWASP including test cases, resources and examples.

1 Updated Oct 30, 2019

List of DCIM (data center infrastructure management) software

1 Updated Jul 30, 2019
Python 1 Updated Feb 7, 2018

Quick script to gather stats on incoming credentials and IPs for a honey listener.

Shell 1 Updated Nov 12, 2016

A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more

PHP 1 Updated May 21, 2015

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

HTML 1 Updated May 22, 2020

Network Infrastructure Penetration Testing Tool

Python 1 Updated Aug 17, 2020

Python program to steganography files into images using the Least Significant Bit.

Python 1 Updated Oct 1, 2020
Next