Josh Mason's repositories

Language:PythonLicense:MITStargazers:75Issues:4Issues:0
Language:HTMLLicense:Apache-2.0Stargazers:3Issues:0Issues:0

Cybersecurity-Debrief-Checklist

This checklist can be used by cybersecurity teams to hone in on the good, the bad, and the ugly of an operation. From a pentest, to an incident response case, from a risk assessment, to a table top scenario, or even more.

License:MITStargazers:1Issues:1Issues:0

365Inspect

A PowerShell script that automates the security assessment of Microsoft Office 365 environments.

Language:PowerShellLicense:MITStargazers:0Issues:0Issues:0

ADGenerator

Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.

Language:PowerShellStargazers:0Issues:1Issues:0

airgeddon

This is a multi-use bash script for Linux systems to audit wireless networks.

Language:ShellLicense:GPL-3.0Stargazers:0Issues:1Issues:0

AutoBlue-MS17-010

This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010

Language:PythonLicense:MITStargazers:0Issues:1Issues:0

blue-team-wiki

Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries

Language:HTMLStargazers:0Issues:1Issues:0

breach-parse

A tool for parsing breached passwords

Language:ShellStargazers:0Issues:1Issues:0

C-cheatsheet

A MEMORY DUMP OF C PROGRAMMING, by Sean Eyre (@oni49) and Stephen Semmelroth (@stephensemmelroth / @diodepack) of Rainier Cyber. This document is intended to provide you a quick desk reference for C’s syntax and semantics. We included several example programs that will elaborate on each section in greater detail.

Language:CLicense:Apache-2.0Stargazers:0Issues:1Issues:0

C-labs

For all of my C practice

Language:CStargazers:0Issues:2Issues:0
Language:HTMLStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

concierge

Repo for Concierge AI dev work

License:Apache-2.0Stargazers:0Issues:0Issues:0

GRASSMARLIN

Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber

License:NOASSERTIONStargazers:0Issues:0Issues:0

h4cker

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

License:MITStargazers:0Issues:0Issues:0

ICS-Security-Study-Resources

A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.

Stargazers:0Issues:1Issues:0

intruder

CLI web form fuzzer

Stargazers:0Issues:0Issues:0

IRM

Incident Response Methodologies 2022

License:NOASSERTIONStargazers:0Issues:0Issues:0
Language:HTMLStargazers:0Issues:2Issues:0

osx-re-101

A collection of resources for OSX/iOS reverse engineering.

Stargazers:0Issues:1Issues:0
License:NOASSERTIONStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:2Issues:0
Stargazers:0Issues:0Issues:0

showmethemoney

These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and the executives/business owners.

License:CC0-1.0Stargazers:0Issues:0Issues:0

TRIBUTE

This is a writeup/walkthrough for the TryHackMe room "Tribute" by Joshua17sc

Stargazers:0Issues:0Issues:0

vCISO-Tools

Some of the tools we use during vCISO engagements

License:MITStargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:3Issues:0