pabit's repositories
maldev-for-dummies
A workshop about Malware Development
JuicyPotatoNG
Another Windows Local Privilege Escalation from Service Account to System
threat-dragon
An open source threat modeling tool from OWASP
skf-flask
Security Knowledge Framework (SKF) Python Flask / Angular project
allstar
GitHub App to set and enforce security policies
wordlists
Real-world infosec wordlists, updated regularly
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
awesome-bugbounty-tools
A curated list of various bug bounty tools
EventLogging
Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.
awesome-tunneling
List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
o365spray
Username enumeration and password spraying tool aimed at Microsoft O365.
pe-bear
Portable Executable reversing tool with a friendly GUI
Teamsniper
Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).
Sandman
Sandman is a NTP based backdoor for red team engagements in hardened networks.
malicious-pdf
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
tsunami-security-scanner-plugins
This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
resume-cli
CLI tool to easily setup a new resume 📑
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
bbscope
Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
pypykatz
Mimikatz implementation in pure Python
PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
Intune-ACSC-Windows-Hardening-Guidelines
Collection of Intune policies that could assist with implementing ACSC's Windows hardening guidance.
Zircolite
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
memOptix
A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.
SecCon-Framework
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.
awesome-api-security
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.