Ricardo Dias's starred repositories
CVE-2021-40444
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
EnterprisePurpleTeaming
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
XLMMacroDeobfuscator
Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
Threat-Hunting-and-Detection
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
falcon-crowdstrike
A collection of searches, interesting events and tables on Crowdstrike Splunk.
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
IncidentsMindMaps
Cybersecurity Incidents Mind Maps
security_content
Splunk Security Content
SweetPotato
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
xcyclopedia
Encyclopedia for Executables
attack-datasources
This content is analysis and research of the data sources currently listed in ATT&CK.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
awesome-jupyter
A curated list of awesome Jupyter projects, libraries and resources
SharpSploit
SharpSploit is a .NET post-exploitation library written in C#
DefendTheFlag
Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test out Microsoft's security products.
Microsoft-Sentinel2Go
Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.