tuckner's starred repositories

ReLaXed

Create PDF documents using web technologies

Language:JavaScriptLicense:ISCStargazers:11805Issues:187Issues:133

vuls

Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices

Language:GoLicense:GPL-3.0Stargazers:10934Issues:326Issues:597

atomic-red-team

Small and highly portable detection tests based on MITRE's ATT&CK.

caldera

Automated Adversary Emulation Platform

Language:PythonLicense:Apache-2.0Stargazers:5551Issues:167Issues:760

textgenrnn

Easily train your own text-generating neural network of any size and complexity on any text dataset with a few lines of code.

Language:PythonLicense:NOASSERTIONStargazers:4941Issues:136Issues:230

DetectionLab

Automate the creation of a lab environment complete with security tooling and logging best practices

Language:HTMLLicense:MITStargazers:4622Issues:154Issues:598

AD-Attack-Defense

Attack and defend active directory using modern post exploitation adversary tradecraft activity

Red-Team-Infrastructure-Wiki

Wiki to collect Red Team infrastructure hardening resources

markovify

A simple, extensible Markov chain generator.

Language:PythonLicense:MITStargazers:3298Issues:67Issues:79

pydictor

A powerful and useful hacker dictionary builder for a brute-force attack

Language:PythonLicense:GPL-3.0Stargazers:3264Issues:95Issues:39

webtty

Share a terminal session over WebRTC

Language:GoLicense:MITStargazers:2702Issues:50Issues:28

sysmon-modular

A repository of sysmon configuration modules

Language:PowerShellLicense:MITStargazers:2636Issues:166Issues:98

signature-base

YARA signature and IOC database for my scanners and tools

Language:YARALicense:NOASSERTIONStargazers:2455Issues:197Issues:96

Microsoft-365-Defender-Hunting-Queries

Sample queries for Advanced hunting in Microsoft 365 Defender

Language:Jupyter NotebookLicense:MITStargazers:1924Issues:197Issues:36

domainhunter

Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names

Language:PythonLicense:BSD-3-ClauseStargazers:1525Issues:60Issues:25

flightsim

A utility to safely generate malicious network traffic patterns and evaluate controls.

Language:GoLicense:NOASSERTIONStargazers:1247Issues:35Issues:50

windows-event-forwarding

A repository for using windows event forwarding for incident detection and response

Language:RoffLicense:NOASSERTIONStargazers:1214Issues:332Issues:25

phpbash

A semi-interactive PHP shell compressed into a single file.

Language:PHPLicense:Apache-2.0Stargazers:871Issues:21Issues:17

FCL

FCL (Fileless Command Lines) - Known command lines of fileless malicious executions

Generex

A Java library for generating String from a regular expression.

chrome-headless-browser-docker

Continuously building Chrome Docker image for Linux.

Language:DockerfileLicense:Apache-2.0Stargazers:369Issues:19Issues:45

Packer-Windows10

A Packer build for Windows 10

Language:PowerShellLicense:MITStargazers:130Issues:8Issues:14

f5-automation-labs

F5 Super-NetOps Programmability, Automation and DevOps Training Classes

Language:ShellLicense:MITStargazers:106Issues:49Issues:18

rhsummitlabs-2018

The documentation repository for all Red Hat Summit 2018 Labs. The full labs agenda is online: https://agenda.summit.redhat.com/?Instructor-led%20Lab=0

app_splunk_sysmon_hunter

Splunk App to assist Sysmon Threat Hunting

License:GPL-3.0Stargazers:38Issues:7Issues:0

ex407-study-guide

EX407 Red Hat Certificate of Expertise in Ansible Automation Study Guide

cuckoo_installer

Installer to help with Cuckoo setup

Language:YARAStargazers:6Issues:1Issues:0

Azure-Log-Analytics-Queries

Queries to parse sysmon event log file with Azure Log Analytics

License:MITStargazers:4Issues:2Issues:0

ansible_demo

Ansible Demonstration Check Point

Language:PythonLicense:MITStargazers:1Issues:1Issues:0