pika990z's repositories
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
attack_data
A Repository of curated datasets from various attacks
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
attack_range_local
Build a attack range in your local machine
BLUESPAWN
An Active Defense and EDR software to empower Blue Teams
DePaul-Cybersecurity-Automation-Test
This is a Test Repo for DePaul - CNS 397/597 Cybersecurity Automation
detection-rules
Rules for Elastic Security's detection engine
DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems
learning-malware
i've been following a blog by chetan Nayak to understand how malware works
lme
Logging Made Easy
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
polarbears
Lots of polar bear
python-for-pentesting
projects for python pentesting
sliver
Adversary Emulation Framework
splunk
Splunk Stuffs!
sysmon-modular
A repository of sysmon configuration modules
ThreatHunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
VirusTotalC2
Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , and in case you don't have C2 infrastructure , now you have a free one
VXUG-Papers
Research code & papers from members of vx-underground.
wazuh-splunk
Wazuh - Splunk app
WinAPI-Tricks
Collection of various WINAPI tricks / features used or abused by Malware
working-db-php
starting with appsec
YaraHunts
Random hunting ordiented yara rules