Skip to content
View krooth's full-sized avatar
  • Active Countermeasures
  • Addis Ababa, Ethiopia

Block or report krooth

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

Go 486 48 Updated Dec 31, 2025

A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.

431 34 Updated Dec 19, 2025

Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science

Shell 146 15 Updated Jan 1, 2026

A Python script that uses a custom statistical measure Range Coverage Ratio (RCR) to determine the use of payload/data jitter in a C2 agent

HTML 2 Updated Feb 18, 2025

magnum opus c2 threat emulation framework

Go 6 Updated Dec 2, 2025

A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.

PowerShell 1,400 131 Updated Nov 28, 2025

Indicators of Compromise (IOCs) from malware or suspicious network traffic

113 12 Updated Nov 18, 2025

Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.

PowerShell 1,131 112 Updated Dec 5, 2025

Tools for working with Zeek logs

Shell 1 Updated Jun 19, 2025

Extracts fields from zeek logs, compatible with zeek-cut

Python 25 3 Updated Jul 10, 2024

Proxmox VE Helper-Scripts (Community Edition)

Shell 24,565 2,218 Updated Jan 2, 2026

Quick shell script by Chris Brenton at ACM to share SSH Public keys for people to confirm fingerprints on first ssh.

Shell 3 Updated May 2, 2025

This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.

Python 77 19 Updated Sep 14, 2025
Jupyter Notebook 1 Updated Sep 6, 2024

Create lab environment for Linux Command Line course

Shell 49 15 Updated Sep 24, 2024

WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities.

Python 414 46 Updated Oct 14, 2025

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 12,456 1,471 Updated Sep 17, 2025

The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Access Model.

134 12 Updated Sep 28, 2024
Jupyter Notebook 8 4 Updated Sep 6, 2024

Yet another draw.io Shapes Collection

33 3 Updated Jan 18, 2025

An awesome list of resources on deception-based security with honeypots and honeytokens

179 27 Updated Dec 23, 2024

A simple, lightweight PowerShell script to remove pre-installed apps, disable telemetry, as well as perform various other changes to customize, declutter and improve your Windows experience. Win11D…

PowerShell 36,975 1,432 Updated Dec 29, 2025

Diagrams used in my YouTube Videos

195 168 Updated Feb 15, 2025

Attack Detect Defend Course Pre-Requisites

1 Updated Jun 20, 2024

A little tool to play with Windows security

C 21,146 4,021 Updated May 11, 2025

Six Degrees of Domain Admin

PowerShell 10,488 1,789 Updated Aug 1, 2025

AD Lab setup for learning infosec

HTML 2 Updated Mar 7, 2024

BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…

PowerShell 2,200 292 Updated Jun 7, 2023

An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.

C++ 47,461 2,646 Updated Dec 28, 2025
Next