Skip to content
View konwro's full-sized avatar

Block or report konwro

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Free hands-on digital forensics labs for students and faculty

Jupyter Notebook 2,189 489 Updated Oct 12, 2025

🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.

Python 389 61 Updated Apr 3, 2024

Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…

PowerShell 1,287 256 Updated Jun 1, 2023

A curated list of tools for incident response

8,522 1,608 Updated Jul 18, 2024

This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.

2,753 547 Updated Sep 17, 2024

Trace Labs OSINT Linux Distribution based on Kali.

HTML 775 116 Updated Aug 20, 2023

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

190,064 11,710 Updated Nov 19, 2024

yarGen is a generator for YARA rules

Python 1,725 302 Updated Oct 10, 2025

Main Sigma Rule Repository

Python 9,706 2,437 Updated Oct 17, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 70,923 16,094 Updated Oct 5, 2025

Malware samples, analysis exercises and other interesting resources.

HTML 1,584 232 Updated Jan 13, 2024

This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR

81 32 Updated Mar 3, 2022

Understand adversary tradecraft and improve detection strategies

PowerShell 714 80 Updated Mar 9, 2023

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 2,006 358 Updated May 28, 2025

🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.

Python 497 89 Updated Apr 3, 2024

Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet

5,262 1,250 Updated Dec 12, 2024

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

Python 12,489 3,056 Updated Oct 21, 2024

Web app that provides basic navigation and annotation of ATT&CK matrices

TypeScript 2,233 654 Updated Oct 14, 2025

A terminal UI for tshark, inspired by Wireshark

Go 9,604 423 Updated Apr 30, 2024

Web and API based SMTP testing

Go 15,386 1,137 Updated Feb 13, 2024

Easy automated vulnerability scanning, reporting and analysis

JavaScript 1 Updated Jan 10, 2020

A curated list of the most common and most interesting robots.txt disallowed directories.

Shell 1 Updated Dec 1, 2019

Penetration tests guide based on OWASP including test cases, resources and examples.

1 Updated Oct 30, 2019

List of DCIM (data center infrastructure management) software

1 Updated Jul 30, 2019
Python 1 Updated Feb 7, 2018

Quick script to gather stats on incoming credentials and IPs for a honey listener.

Shell 1 Updated Nov 12, 2016

A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more

PHP 1 Updated May 21, 2015

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

HTML 1 Updated May 22, 2020

Network Infrastructure Penetration Testing Tool

Python 1 Updated Aug 17, 2020

Python program to steganography files into images using the Least Significant Bit.

Python 1 Updated Oct 1, 2020
Next