Sigrun's starred repositories

BounceBack

↕️🤫 Stealth redirector for your red team operation security

Language:GoLicense:MITStargazers:554Issues:0Issues:0

CVE_Prioritizer

Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.

Language:PythonLicense:BSD-3-ClauseStargazers:451Issues:0Issues:0

iodine

Official git repo for iodine dns tunnel

Language:CLicense:ISCStargazers:5845Issues:0Issues:0

gap

Google Maps API checker

Language:GoLicense:Apache-2.0Stargazers:60Issues:0Issues:0

NMap-Differ

Script to be run by cron jobs to diff Nmap scan of an ip and alert to changes via slack

Language:PythonStargazers:7Issues:0Issues:0

AutoNmap

Automated daily scan using Nmap and report on the differences

Language:ShellStargazers:93Issues:0Issues:0

TeamsPhisher

Send phishing messages and attachments to Microsoft Teams users

Language:PythonStargazers:979Issues:0Issues:0

AD_Miner

AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses

Language:JavaScriptLicense:GPL-3.0Stargazers:903Issues:0Issues:0

UltimateAppLockerByPassList

The goal of this repository is to document the most common techniques to bypass AppLocker.

Language:PowerShellStargazers:1826Issues:0Issues:0

Valid8Proxy

Tool designed for fetching, validating, and storing working proxies.

Language:PythonLicense:AGPL-3.0Stargazers:157Issues:0Issues:0

PROXY-List

Get PROXY List that gets updated everyday

Stargazers:2955Issues:0Issues:0

GraphRunner

A Post-exploitation Toolset for Interacting with the Microsoft Graph API

Language:PowerShellLicense:MITStargazers:769Issues:0Issues:0

Nmap-Analysis

Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report using ChatGPT

Language:PythonLicense:AGPL-3.0Stargazers:18Issues:0Issues:0

Stealerium

Stealer + Clipper + Keylogger

Language:C#License:MITStargazers:999Issues:0Issues:0

ipatool

Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store

Language:GoLicense:MITStargazers:5236Issues:0Issues:0

FireBaseScanner

The scripts helps security analsts to identify misconfigured firebase instances.

Language:PythonStargazers:191Issues:0Issues:0

SOAPHound

SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.

Language:C#License:GPL-3.0Stargazers:584Issues:0Issues:0

KEV

Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.

License:Apache-2.0Stargazers:494Issues:0Issues:0

mindsdb

The platform for customizing AI from enterprise data

Language:PythonLicense:NOASSERTIONStargazers:21794Issues:0Issues:0

ChatDev

Create Customized Software using Natural Language Idea (through LLM-powered Multi-Agent Collaboration)

Language:ShellLicense:Apache-2.0Stargazers:23958Issues:0Issues:0

GHunt

🕵️‍♂️ Offensive Google framework.

Language:PythonLicense:NOASSERTIONStargazers:15118Issues:0Issues:0

Spoofy

Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.

Language:PythonLicense:CC0-1.0Stargazers:552Issues:0Issues:0

harpoon

CLI tool for open source and threat intelligence

Language:PythonLicense:GPL-3.0Stargazers:1143Issues:0Issues:0

attack-flow

Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.

Language:TypeScriptLicense:Apache-2.0Stargazers:513Issues:0Issues:0

atomic-red-team

Small and highly portable detection tests based on MITRE's ATT&CK.

Language:CLicense:MITStargazers:9252Issues:0Issues:0

Cyber-Adversary-Heatmaps

Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.

License:MITStargazers:33Issues:0Issues:0

AnimateAnyone

Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation

License:Apache-2.0Stargazers:14070Issues:0Issues:0

Fooocus

Focus on prompting and generating

Language:PythonLicense:GPL-3.0Stargazers:37139Issues:0Issues:0

mantis

Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.

Language:PythonLicense:Apache-2.0Stargazers:723Issues:0Issues:0

Categorized-Adversary-TTPs

Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-technique pivoting.

Language:PythonLicense:MITStargazers:48Issues:0Issues:0