Thomas Defise's repositories
agusmakmun.github.io
:coffee: Free and open-source Jekyll theme
Artifacts
Artifacts
atc-react
A knowledge base of actionable Incident Response techniques
black
The uncompromising Python code formatter
checkov
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
detection-rules
Rules for Elastic Security's detection engine
Docker_NginxAccessDenied
Simple Ngnix docker with an Access Denied page
hacker101
Hacker101
InSpy
A python based LinkedIn enumeration tool
misp-docker
MISP Docker (XME edition)
ODIN
Automated network asset, email, and social media profile discovery and cataloguing.
Phishing.Database
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
PowerTools
PowerTools is a collection of PowerShell projects with a focus on offensive operations.
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PyFuscation
Obfuscate powershell scripts by replacing Function names, Variables and Parameters.
python3-nmap
A python 3 library which helps in using nmap port scanner. This is done by converting each nmap command into a callable python3 method or function. System administrators can now automatic nmap scans using python
ScoutSuite
Multi-Cloud Security Auditing Tool
security-docs
Home for Elastic Security Documentation
teler
Real-time HTTP Intrusion Detection
theHarvester
E-mails, subdomains and names Harvester - OSINT
trivy
A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
twint
An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
Watson
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
whispers
Identify hardcoded secrets and dangerous behaviours