armstrongcyber Goto Github PK
Type: User
Type: User
A knowledge base of actionable Incident Response techniques
A curated list of tools for incident response
Cloned incase they disappear
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
MITRE TTPs derived from Conti's leaked playbooks from XSS.IS
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.
Joplin - an open source note taking and to-do application with synchronization capabilities for Windows, macOS, Linux, Android and iOS. Forum: https://discourse.joplinapp.org/
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Cobalt Strike Malleable C2 Design and Reference Guide
An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
PowerShell script for deobfuscating encoded PowerShell scripts
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams
Wiki to collect Red Team infrastructure hardening resources
A Game of Hackers (CTF Scoreboard & Game Manager)
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Tiny PHP Web shell for executing unix commands from web page
Sysmon configuration file template with default high-quality event tracing
An informational repo about hunting for adversaries in your IT environment.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.