1r-f0rhun73r Goto Github PK
Type: User
Type: User
Log format description files for lnav
This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay for such things for nothing.
TIMELINE_COLOR_TEMPLATE.xlsx - (How To Use Log2timeline!) - https://medium.com/dfclub/how-to-use-log2timeline-54377e24872a
An information security preparedness tool to do adversarial simulation.
A set of PowerShell scripts that allow for complete and reliable acquisition of the Microsoft 365 Unified Audit Log
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonly found in metadata are usernames, domains, software titles, and computer names.
PowerSploit - A PowerShell Post-Exploitation Framework
PowerTools is a collection of PowerShell projects with a focus on offensive operations.
Powershell Threat Hunting Module
RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provide accurate and timely feedback in the form of reports.
Evaluate existing GCP resources against defined policies. Policies may also contain instructions for remediating such violations.
Reverse Engineer's Toolkit
Security configuration is complex. With thousands of group policies available in Windows, choosing the βbestβ setting is difficult. Itβs not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration i
A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
A repository of sysmon configuration modules
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
Repository of tools, YARA rules, and code-snippets from Stairwell's research team.
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022
Executes PowerShell from an unmanaged process
http://moaistory.blogspot.com/2018/10/winsearchdbanalyzer.html
fork from https://github.com/ultralytics/yolov3
A declarative, efficient, and flexible JavaScript library for building user interfaces.
π Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. πππ
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google β€οΈ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.