J's starred repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
imaginaryC2
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
awesome-yara
A curated list of awesome YARA rules, tools, and people.
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
Malleable-C2-Profiles
Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use. These profiles work with Cobalt Strike 3.x.
DanderSpritz_lab
A fully functional DanderSpritz lab in 2 commands
SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
elasticintel
Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.
hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
hyperpolyglot
hyperpolyglot.org
SharpShooter
Payload Generation Framework
MSRC-Security-Research
Security Research from the Microsoft Security Response Center (MSRC)