GelosSnake's starred repositories

ghidra

Ghidra is a software reverse engineering (SRE) framework

Language:JavaLicense:Apache-2.0Stargazers:49706Issues:1028Issues:4717

cleverhans

An adversarial example library for constructing attacks, building defenses, and benchmarking both

Language:Jupyter NotebookLicense:MITStargazers:6126Issues:189Issues:453

docker-lambda

Docker images and test runners that replicate the live AWS Lambda environment

opencti

Open Cyber Threat Intelligence Platform

Language:JavaScriptLicense:NOASSERTIONStargazers:5275Issues:132Issues:4823

pacu

The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

Language:PythonLicense:BSD-3-ClauseStargazers:4225Issues:109Issues:126

ThreatHunter-Playbook

A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.

Language:PythonLicense:MITStargazers:3943Issues:369Issues:32

velociraptor

Digging Deeper....

Language:GoLicense:NOASSERTIONStargazers:2826Issues:75Issues:1104

RE-iOS-Apps

A completely free, open source and online course about Reverse Engineering iOS Applications.

APT_REPORT

Interesting APT Report Collection And Some Special IOC

DeTTECT

Detect Tactics, Techniques & Combat Threats

Language:SCSSLicense:GPL-3.0Stargazers:2020Issues:92Issues:96

canarytokens

Canarytokens helps track activity and actions on your network.

Language:HTMLLicense:NOASSERTIONStargazers:1710Issues:45Issues:116

Virtuailor

IDAPython tool for creating automatic C++ virtual tables in IDA Pro

Language:PythonLicense:GPL-3.0Stargazers:1236Issues:50Issues:17

PowerHub

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

Language:PowerShellLicense:MITStargazers:707Issues:18Issues:51

Admin

Ghost's admin client

Language:JavaScriptLicense:MITStargazers:626Issues:37Issues:0

docker-windows-box

Various Vagrant envs with Windows 2019/10 and Docker, Swarm mode, LCOW, WSL2, ...

Language:PowerShellLicense:MITStargazers:590Issues:26Issues:22

deep-pwning

Metasploit for machine learning.

Language:PythonLicense:MITStargazers:553Issues:63Issues:6

misp-galaxy

Clusters and elements to attach to MISP events or attributes (like threat actors)

Language:PythonLicense:NOASSERTIONStargazers:509Issues:48Issues:104

MalConfScan

Volatility plugin for extracts configuration data of known malware

Language:PythonLicense:NOASSERTIONStargazers:478Issues:36Issues:17

osctrl

Fast and efficient osquery management

Language:GoLicense:MITStargazers:347Issues:9Issues:102

source

Daenerys: A framework for interoperability between IDA and Ghidra

Language:PythonLicense:MITStargazers:298Issues:25Issues:0

x_old_misp_docker

MISP Docker (XME edition)

Vba2Graph

Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.

Language:PythonLicense:EPL-2.0Stargazers:274Issues:19Issues:4

aws-security-cert-service-notes

Security aspects of AWS products for the Security Specialist certification

Cuckoo-AWS

Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling infrastructure

Language:JavaScriptLicense:NOASSERTIONStargazers:134Issues:20Issues:27

aws-lambda-blog

AWS Lambda serverless blogging platform

Language:JavaScriptLicense:MITStargazers:125Issues:18Issues:17

otx_misp

Imports Alienvault OTX pulses to a MISP instance

Language:Jupyter NotebookLicense:NOASSERTIONStargazers:53Issues:15Issues:31

dscan

D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit

Threat-Intelligence

A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.

Language:YARALicense:Apache-2.0Stargazers:10Issues:3Issues:0

L33ter

Golang tool to manipulate a wordlist to "l33t" writing

Language:GoLicense:GPL-3.0Stargazers:4Issues:3Issues:0