Nate Schmitt's starred repositories
How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server.
GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
awesome-honeypots
an awesome list of honeypot resources
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-vim-colorschemes
Collection of awesome color schemes for Neo/vim, merged for quick use.
AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
iceberg.vim
:antarctica: Bluish color scheme for Vim and Neovim
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
malware-samples
A collection of malware samples caught by several honeypots i manage
ADAPE-Script
Active Directory Assessment and Privilege Escalation Script
physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
arch-audit
A utility like pkg-audit for Arch Linux. Based on Arch Security Team data.
SecCon-Framework
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.
openvasreporting
OpenVAS Reporting: Convert OpenVAS XML report files to reports
Office365-Setup-DKIM-DMARC-SPF
Setup guide for Office 365 Administrators who are unable to use ATP to configure SPF, DKIM and DMARC.
sonicwallRuleParser
Parses Sonicwall rules, groups, and services from settings export.
hash_combiner
Takes a file of username:hash and a file of hash:Password. Outputs a list of username:password