br3ach3r-fff's repositories

Elemental

Elemental - An ATT&CK Threat Library

Language:HTMLLicense:NOASSERTIONStargazers:2Issues:0Issues:0

PowerShellForPentesters

Course repository for PowerShell for Pentesters Course

Language:PowerShellStargazers:2Issues:0Issues:0

Covenant

Covenant is a collaborative .NET C2 framework for red teamers.

Language:C#License:GPL-3.0Stargazers:1Issues:0Issues:0

DeTTECT

Detect Tactics, Techniques & Combat Threats

Language:PythonLicense:GPL-3.0Stargazers:1Issues:0Issues:0

lsassy

Extract credentials from lsass remotely

Language:PythonLicense:MITStargazers:1Issues:0Issues:0

Microsoft-365-Defender-Hunting-Queries

Sample queries for Advanced hunting in Microsoft 365 Defender

Language:Jupyter NotebookLicense:MITStargazers:1Issues:0Issues:0

OffensiveVBA

This repo covers some code execution and AV Evasion methods for Macros in Office documents

Language:VBALicense:BSD-2-ClauseStargazers:1Issues:0Issues:0

Rubeus

Trying to tame the three-headed dog.

Language:C#License:NOASSERTIONStargazers:1Issues:0Issues:0

Active-Directory-Exploitation-Cheat-Sheet

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

License:MITStargazers:0Issues:0Issues:0

adversary_emulation_library

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

License:Apache-2.0Stargazers:0Issues:0Issues:0

APTSimulator

A toolset to make a system look as if it was the victim of an APT attack

License:MITStargazers:0Issues:0Issues:0

attack-arsenal

A collection of red team and adversary emulation resources developed and released by MITRE.

License:Apache-2.0Stargazers:0Issues:0Issues:0

awesome-threat-detection

A curated list of awesome threat detection and hunting resources

Stargazers:0Issues:0Issues:0

Cobalt-Strike-CheatSheet

Some notes and examples for cobalt strike's functionality

License:MITStargazers:0Issues:0Issues:0

Cobalt-Wipe

Cobalt wipe is the non-commercial version of Cobalt-Strike 4.3 (May 2021 Release)

License:NOASSERTIONStargazers:0Issues:0Issues:0

CRTO

Certified Red Team Operator

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

gsocket

Connect like there is no firewall. Securely.

License:BSD-2-ClauseStargazers:0Issues:0Issues:0

hyperdrive

C2-Framework

Stargazers:0Issues:0Issues:0

kerbrute

A tool to perform Kerberos pre-auth bruteforcing

License:Apache-2.0Stargazers:0Issues:0Issues:0

linux-exploit-suggester

Linux privilege escalation auditing tool

License:GPL-3.0Stargazers:0Issues:0Issues:0

Logstash

Contains Logstash related content including tons of Logstash configurations

License:GPL-3.0Stargazers:0Issues:0Issues:0

maldev-for-dummies

A workshop about Malware Development

License:NOASSERTIONStargazers:0Issues:0Issues:0

PythonDataScienceHandbook

Python Data Science Handbook: full text in Jupyter Notebooks

License:MITStargazers:0Issues:0Issues:0

rita

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

License:GPL-3.0Stargazers:0Issues:0Issues:0

SharpSploit

SharpSploit is a .NET post-exploitation library written in C#

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

sigma

Generic Signature Format for SIEM Systems

Stargazers:0Issues:0Issues:0

sshuttle

Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.

License:LGPL-2.1Stargazers:0Issues:0Issues:0

sysmon-config

Sysmon configuration file template with default high-quality event tracing

Stargazers:0Issues:0Issues:0

wfuzz

Web application fuzzer

License:GPL-2.0Stargazers:0Issues:0Issues:0