wawa's repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
awesome-detection-engineering
A list of useful Detection Engineering-related resources.
bounty-targets
This project crawls bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) hourly and dumps them into the bounty-targets-data repo
car
Cyber Analytics Repository
curiefense
Curiefense is a unified, open source platform protecting cloud native applications.
DFIRMindMaps
A repository of DFIR-related Mind Maps geared towards the visual learners!
EVTX-to-MITRE-Attack
Set of EVTX samples (>170) mapped to MITRE Att@k tactic and techniques to measure your SIEM coverage or developed new use cases.
fwknop
Single Packet Authorization > Port Knocking
GCPSketchnote
If you are looking to become a Google Cloud Engineer , then you are at the right place. GCPSketchnote is series where I share Google Cloud concepts in quick and easy to learn format.
HackJava
《Java安全-只有Java安全才能拯救宇宙》Only Java Security Can Save The Universe.
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Pentesting-Active-Directory-CN
域渗透脑图中文翻译版
prowler
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 240 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
RedTeam-Tactics-and-Techniques
Red Teaming Tactics and Techniques
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
security_content
Splunk Security Content
SecurityBenchmarks
Supplemental information and resources for the Security Benchmark documentation available at https://docs.microsoft.com/azure/security/benchmarks/.
semgrep
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
Stormspotter
Azure Red Team tool for graphing Azure and Azure Active Directory objects
tailscale
The easiest, most secure way to use WireGuard and 2FA.
The-Hacker-Recipes
This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile apps, iot, social engineering, etc.
timesketch
Collaborative forensic timeline analysis
vulnerability-paper
收集的文章
vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
wechatbot
为个人微信接入ChatGPT
yakit
Cyber Security ALL-IN-ONE Platform