mrz-secops-offsec's repositories
Momentum-Firmware
🐬 Feature-rich, stable and customizable Flipper Firmware
Orange-Cyberdefense_GOAD
game of active directory
Russian-APT-Tool-Matrix
A tool matrix for Russian APTs based on the Ransomware Tool Matrix
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
beets
music library manager and MusicBrainz tagger
browserless
Deploy headless browsers in Docker. Run on our cloud or bring your own. Free for non-commercial uses.
certainly
Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scenarios.
contentctl
Splunk Content Control Tool
cowrie
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
CVE-2024-38077
RDL的堆溢出导致的RCE
CVE-2024-POC
CVE-2024-38077-POC 原文已被作者删除,备份用,非原创,EXP & POC
CVE202438063
poc for CVE-2024-38063 (RCE in tcpip.sys)
docker-firefox
Docker container for Firefox
doorsim
An Open-Source Door Simulator for RFID/PACS Training
DriverJack
Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths
ExtAnalysis
Browser Extension Analysis Framework - Scan, Analyze Chrome, firefox and Brave extensions for vulnerabilities and intels
flipperzero-firmware-wPlugins
RogueMaster Flipper Zero Firmware
kopiaFork
Cross-platform backup tool for Windows, macOS & Linux with fast, incremental backups, client-side end-to-end encryption, compression and data deduplication. CLI and GUI included.
meshtastic_firmware
Meshtastic device firmware
OST-C2-Spec
Open Source C&C Specification
pm3
Iceman Fork - Proxmark3
power-pwn
An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform
protections-artifacts
Elastic Security detection content for Endpoint
sccm-http-looter
Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)
security-content
Splunk Security Content
sublime-sec_sublime-rules
Sublime rules for email attack detection, prevention, and threat hunting.
truffleHog
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
WindowsDowndate
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities