day1's starred repositories
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Web-Attack-Cheat-Sheet
Web Attack Cheat Sheet
InfoSec-Black-Friday
All the deals for InfoSec related software/tools this Black Friday
PHP-backdoors
A collection of PHP backdoors. For educational or testing purposes only.
Awesome-CloudSec-Labs
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
SysWhispers3
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
MustLearnKQL
Code included as part of the MustLearnKQL blog series
CheckPlease
Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
sysmon-dfir
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
awesome-edr-bypass
Awesome EDR Bypass Resources For Ethical Hacking
FalconHound
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool.
Yara-rules
Collection of private Yara rules.
Proxy-DLL-Loads
A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.
flipperzero
This repo contains my own Ducky/BadUSB scripts, related PowerShell scripts and other Flipper Zero related stuff.
Create-Thread-Shellcode-Fetcher
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.