pabit's repositories
awesome-soc-analyst
Useful resources for SOC Analyst and SOC Analyst candidates.
AzureHound
Azure Data Exporter for BloodHound
BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
CTI-fundamentals
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence
django-DefectDojo
DefectDojo is a DevSecOps and vulnerability management platform.
forensictools
Collection of forensic tools
Free-Certifications
A curated list of free courses & certifications.
GOAD
game of active directory
hackingtool
ALL IN ONE Hacking Tool For Hackers
iLEAPP
iOS Logs, Events, And Plist Parser
KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
laurel
Transform Linux Audit logs for SIEM usage
Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
Office365itpros
Office 365 for IT Pros PowerShell examples
openhaystack
Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.
PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PoolParty
A set of fully-undetectable process injection techniques abusing Windows Thread Pools
PsMapExec
A PowerShell tool that takes strong inspiration from CrackMapExec.
SIGMA-detection-rules
Set of SIGMA rules (>320) mapped to MITRE Att@k tactic and techniques
sliver
Adversary Emulation Framework
suricata-update
The tool for updating your Suricata rules.
threaduler
your notion connected open source social media scheduler
timesketch
Collaborative forensic timeline analysis
trufflehog
Find and verify credentials
unifios-utilities
A collection of enhancements for UnifiOS based devices
VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
webcopilot
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
wesng
Windows Exploit Suggester - Next Generation