Kodiyilthekkadil's starred repositories
stratus-red-team
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
ElectricEye
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
trufflehog
Find and verify secrets
Subdominator
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty
Subdominator
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
FullBypass
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. Feel free to DM if you find some bugs :)
awesome-ip-search-engines
This repository contains tutorials and tools for working with IP search engines. Search engines that search all devices connected to the Internet and collect a lot of different information about them (open ports, protocols used for data transfer, Whois information etc)).
DetectRaptor
A repository to share publicly available Velociraptor detection content
Sentinel-Queries
Collection of KQL queries
windows-hardening-scripts
Windows 10/11 hardening scripts
White-Phoenix
A tool to recover content from files encrypted with intermittent encryption
Faction-Burp
The Faction Burp Suite Extension
EDRSilencerDetection
This repos provides the ressources for the article of detecting EDRSilencer tool
SploitScan
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
ThreatSeeker
ThreatSeeker: Threat Hunting via Windows Event Logs
Linux-Incident-Response
practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response
Hunting-Lists
A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.
MDE-DFIR-Resources
A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more.
KQL-threat-hunting-queries
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
AzureADRecon
AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic picture of the current state of the target environment.
AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Analyzing_Network_Protocols_with_Wireshark
Everything you need to investigate network and protocols with Wireshark!