Josh Mason's repositories
Cybersecurity-Debrief-Checklist
This checklist can be used by cybersecurity teams to hone in on the good, the bad, and the ugly of an operation. From a pentest, to an incident response case, from a risk assessment, to a table top scenario, or even more.
365Inspect
A PowerShell script that automates the security assessment of Microsoft Office 365 environments.
ADGenerator
Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.
AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
blue-team-wiki
Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries
breach-parse
A tool for parsing breached passwords
C-cheatsheet
A MEMORY DUMP OF C PROGRAMMING, by Sean Eyre (@oni49) and Stephen Semmelroth (@stephensemmelroth / @diodepack) of Rainier Cyber. This document is intended to provide you a quick desk reference for C’s syntax and semantics. We included several example programs that will elaborate on each section in greater detail.
concierge
Repo for Concierge AI dev work
GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
ICS-Security-Study-Resources
A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.
intruder
CLI web form fuzzer
IRM
Incident Response Methodologies 2022
osx-re-101
A collection of resources for OSX/iOS reverse engineering.
showmethemoney
These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and the executives/business owners.
TRIBUTE
This is a writeup/walkthrough for the TryHackMe room "Tribute" by Joshua17sc
vCISO-Tools
Some of the tools we use during vCISO engagements