Matt Collum's starred repositories

ThreatHunter-Playbook

A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.

Language:PythonLicense:MITStargazers:3944Issues:0Issues:0

awesome-python

An opinionated list of awesome Python frameworks, libraries, software and resources.

Language:PythonLicense:NOASSERTIONStargazers:214378Issues:0Issues:0

BeaKer

Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana

Language:ShellLicense:GPL-3.0Stargazers:281Issues:0Issues:0

velociraptor

Digging Deeper....

Language:GoLicense:NOASSERTIONStargazers:2827Issues:0Issues:0

Awesome-Red-Teaming

List of Awesome Red Teaming Resources

License:MITStargazers:6745Issues:0Issues:0

Oriana

Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.

Language:PythonLicense:BSD-3-ClauseStargazers:176Issues:0Issues:0

recon-ng

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

Language:PythonLicense:GPL-3.0Stargazers:3754Issues:0Issues:0

zeek-agent

This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2

Language:C++License:NOASSERTIONStargazers:123Issues:0Issues:0

RedELK

Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.

Language:PythonLicense:BSD-3-ClauseStargazers:2336Issues:0Issues:0

SysmonCommunityGuide

TrustedSec Sysinternals Sysmon Community Guide

Language:CSSStargazers:1115Issues:0Issues:0

physical-docs

This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.

License:UnlicenseStargazers:469Issues:0Issues:0

hashcatch

Capture handshakes of nearby WiFi networks automatically

Language:ShellLicense:GPL-3.0Stargazers:719Issues:0Issues:0

things.sh

Simple read-only comand-line interface to your Things 3 database

Language:ShellStargazers:662Issues:0Issues:0

DumpsterFire

"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.

Language:PythonLicense:MITStargazers:976Issues:0Issues:0

VECTR

VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios

Stargazers:1350Issues:0Issues:0

EvilOSX

An evil RAT (Remote Administration Tool) for macOS / OS X.

Language:PythonLicense:GPL-3.0Stargazers:2226Issues:0Issues:0

Invoke-Clipboard

All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications

Language:PowerShellStargazers:52Issues:0Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Language:PHPLicense:MITStargazers:56013Issues:0Issues:0

StegCracker

Steganography brute-force utility to uncover hidden data inside files

Language:PythonLicense:MITStargazers:542Issues:0Issues:0

capes

Cyber Analytics Platform and Examination System (CAPES) Project Page

Language:CSSLicense:Apache-2.0Stargazers:60Issues:0Issues:0

DetectionLab

Automate the creation of a lab environment complete with security tooling and logging best practices

Language:HTMLLicense:MITStargazers:4582Issues:0Issues:0

sysmon-config

Sysmon configuration file template with default high-quality event tracing

Stargazers:4682Issues:0Issues:0

vulnreport

Open-source pentesting management and automation platform by Salesforce Product Security

Language:HTMLLicense:BSD-3-ClauseStargazers:593Issues:0Issues:0

ThreatHunting

A Splunk app mapped to MITRE ATT&CK to guide your threat hunts

License:MITStargazers:1119Issues:0Issues:0

CozyNSM

a network security monitoring platform

Language:ShellStargazers:3Issues:0Issues:0

grr-doc

Documentation for the GRR Rapid Reponse framework

Language:PythonLicense:Apache-2.0Stargazers:299Issues:0Issues:0

passer

Passive service locator, a python sniffer that identifies servers, clients, names and much more

Language:PythonLicense:GPL-3.0Stargazers:239Issues:0Issues:0

PowerMeta

PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonly found in metadata are usernames, domains, software titles, and computer names.

Language:PowerShellLicense:MITStargazers:535Issues:0Issues:0

pivpn

The Simplest VPN installer, designed for Raspberry Pi

Language:ShellLicense:MITStargazers:7064Issues:0Issues:0

macOS-Fortress

Firewall and Privatizing Proxy for Trackers, Attackers, Malware, Adware, and Spammers with Anti-Virus On-Demand and On-Access Scanning (PF, squid, privoxy, hphosts, dshield, emergingthreats, hostsfile, PAC file, clamav)

Language:ShellLicense:MITStargazers:408Issues:0Issues:0