J. Meyer's repositories
crescent-moon-visibility
Code is provided to draw crescent visibility maps according to the following criterias: Yallop criteria, Odeh criteria.
packer
Packer is a tool for creating identical machine images for multiple platforms from a single source configuration.
Mastering-Metasploit
Mastering Metasploit, published by Packt
binderhub
Run your code in the cloud, with technology so advanced, it feels like magic!
DeTTECT
Detect Tactics, Techniques & Combat Threats
velociraptor
Digging Deeper....
Pi.Alert
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
attack-workbench-frontend
An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository contains an Angular-based web application providing the user interface for the ATT&CK Workbench application.
securityonion
Security Onion 2 - Linux distro for threat hunting, enterprise security monitoring, and log management
HXTool
HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physical workstation. HXTool provides additional features and capabilities over the standard FireEye HX web user interface. HXTool uses the fully documented REST API that comes with the FireEye HX for communication with the HX environment.
docker-elk
The Elastic stack (ELK) powered by Docker and Compose.
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
token-list
The community maintained Solana token registry
monkey
Infection Monkey - An automated pentest tool
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
evidently
Interactive reports to analyze machine learning models during validation or production monitoring.
CrackMapExec
A swiss army knife for pentesting networks
aws-well-architected-labs
Hands on labs and code to help you learn, measure, and build using architectural best practices.
GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Shuffle
Shuffle: A general purpose security automation platform platform. We focus on accessibility for all.
wslg
Enabling the Windows Subsystem for Linux to include support for Wayland and X server related scenarios
ansible_collection_crowdstrike
--IN DEVELOPMENT-- Install and configure CrowdStrike's Falcon sensor on Linux, Windows, and OSX, via Ansible.
Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
auditd
Best Practice Auditd Configuration
car
Cyber Analytics Repository
attack-navigator
Web app that provides basic navigation and annotation of ATT&CK matrices