AJ Van Beest's repositories
malicious_chrome_extensions
A list of malicious Chrome extensions
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
awesome-threat-detection
A curated list of awesome threat detection and hunting resources
CTI-Feed-Collector
Open Source Cyber Threat Intelligence Feed Collector
ctifeeds
Cyber Threat Intelligence Feeds
Data-Engineering-HowTo
A list of useful resources to learn Data Engineering from scratch
dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
gitleaks
Scan git repos (or files) for secrets using regex and entropy 🔑
CobaltStrike
CobaltStrike's source code
Hunting-New-Registered-Domains
Hunting Newly Registered Domains
ioc-explorer
Explore Indicators of Compromise Automatically
Keyboard-360Pro
My fork of the Kenisis Keyboard firmware
masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
omnibus
The OSINT Omnibus (beta release)
phishing_catcher
Phishing catcher using Certstream
pihole-updatelists
Update Pi-hole's lists from remote sources easily
playing-with-git
Git practice zone. Unstable; prone to change. Possibly fun.
PoshSec
PoshSec PowerShell Module
PowerMeta
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonly found in metadata are usernames, domains, software titles, and computer names.
python-iocextract
Defanged Indicator of Compromise (IOC) Extractor.
RansomwareSimulator
Powershell script to emulate the "blast radius" of a ransomware infection.
RobotsDisallowed
A curated list of the most common and most interesting robots.txt disallowed directories.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
security-apis
A collective list of public APIs for use in security. Contributions welcome
security_content
Splunk Security Content
vFeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
Yara-Rules
Repository of YARA rules made by McAfee Enterprise ATR Team