pe3zx
|
adaea450d5
|
Remove dead links
|
2019-12-17 13:07:26 +07:00 |
|
pe3zx
|
315e923633
|
Add splunk/attack_range
|
2019-12-17 13:03:59 +07:00 |
|
pe3zx
|
9a7684e179
|
Add: mohamedaymenkarmous/alienvault-otx-api-html
|
2019-12-04 19:17:46 +07:00 |
|
pe3zx
|
14d63b8a73
|
Add quarkslab/irma
|
2019-11-11 16:31:08 +07:00 |
|
pe3zx
|
8189fc0fd1
|
Add DFIRKuiper/Kuiper
|
2019-11-04 21:29:22 +07:00 |
|
pe3zx
|
e95fa636ef
|
Add fortinet/ips-bph-framework
|
2019-11-04 21:16:16 +07:00 |
|
pe3zx
|
cabbb6d6f6
|
Add nccgroup/sadcloud
|
2019-11-04 17:48:56 +07:00 |
|
pe3zx
|
e1ecedc145
|
Add: hunters-forge/api-to-event
|
2019-10-31 15:11:18 +07:00 |
|
pe3zx
|
1f6840e90b
|
Add: nccgroup/GTFOBLookup
|
2019-10-31 15:07:19 +07:00 |
|
pe3zx
|
3b152b5bb7
|
Add: iptv-org/iptv
|
2019-10-31 15:04:56 +07:00 |
|
pe3zx
|
f0d8b7f095
|
Add: mitchellkrogza/Phishing.Database
|
2019-10-31 14:59:24 +07:00 |
|
pe3zx
|
fa65012c09
|
Add: NotSoSecure/cloud-service-enum
|
2019-10-31 14:45:34 +07:00 |
|
pe3zx
|
2915a31b6b
|
Merge branch 'master' of github.com:pe3zx/my-infosec-awesome
|
2019-10-28 22:15:54 +07:00 |
|
pe3zx
|
6c5b1b05a9
|
Add: Raikia/UhOh365
|
2019-10-28 13:23:33 +07:00 |
|
pe3zx
|
c845d43b05
|
Add: outflanknl/Recon-AD
|
2019-10-22 10:25:17 +07:00 |
|
pe3zx
|
75815c1f66
|
Update URL
|
2019-10-21 23:17:55 +07:00 |
|
pe3zx
|
49ccfcd314
|
Migrate from TravisCI to GitHub Actions
|
2019-10-21 23:17:03 +07:00 |
|
pe3zx
|
8f3fbdf52b
|
Update: README.md with cover photo
|
2019-10-15 23:18:12 +07:00 |
|
pe3zx
|
2c9d3ef91c
|
Remove: malware.one
|
2019-10-15 23:03:52 +07:00 |
|
pe3zx
|
c6c5ee58eb
|
Update: Hibernation Recon
|
2019-10-15 23:03:15 +07:00 |
|
pe3zx
|
1c388a8e65
|
Add: SpiderLabs/DoHC2 - DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2) via DNS over HTTPS (DoH).
|
2019-10-14 22:45:00 +07:00 |
|
pe3zx
|
9626afed04
|
Add: Ne0nd0g/merlin - Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
|
2019-10-14 22:39:52 +07:00 |
|
pe3zx
|
d5a776aafe
|
Add: mdsecactivebreach/Chameleon - Chameleon: A tool for evading Proxy categorisation
|
2019-10-14 22:37:51 +07:00 |
|
pe3zx
|
e51057104a
|
Add: lanrat/certgraph
|
2019-10-12 16:04:57 +07:00 |
|
pe3zx
|
a1b96d3dd4
|
Add: crt.sh
|
2019-10-12 16:03:46 +07:00 |
|
pe3zx
|
01f579dd20
|
Add: aboul3la/Sublist3r
|
2019-10-12 16:02:52 +07:00 |
|
pe3zx
|
7c6a66a9b3
|
Add: subfinder/subfinder
|
2019-10-12 16:01:29 +07:00 |
|
pe3zx
|
207fa1637f
|
Add: blechschmidt/massdns
|
2019-10-12 16:00:02 +07:00 |
|
pe3zx
|
6b793c71fd
|
Update section headers
|
2019-10-12 15:56:33 +07:00 |
|
pe3zx
|
458d991849
|
Separate OSINT section from Social Engineering
|
2019-10-12 15:53:55 +07:00 |
|
pe3zx
|
5bda10af89
|
Add: fireeye/ARDvark -
|
2019-10-10 18:16:18 +07:00 |
|
pe3zx
|
4202803aec
|
Add: Capacitor/box-js - A tool for studying JavaScript malware
|
2019-10-10 18:12:04 +07:00 |
|
pe3zx
|
00467a898e
|
Add: ring0lab/catphish - For phishing and corporate espionage.
|
2019-10-10 17:29:55 +07:00 |
|
pe3zx
|
72530b6ef9
|
Add: t4d/PhishingKitHunter
|
2019-10-10 17:05:34 +07:00 |
|
pe3zx
|
0ccdbf7852
|
Add OWASP/Amass - In-depth Attack Surface Mapping and Asset Discovery
|
2019-10-09 15:02:20 +07:00 |
|
pe3zx
|
52acc90764
|
Binary Analysis > secretsquirrel/recomposer
|
2019-10-05 18:51:03 +07:00 |
|
pe3zx
|
345bd6d206
|
DFIR > SekoiaLab/fastir_artifacts
|
2019-10-05 18:42:00 +07:00 |
|
pe3zx
|
4ac37ccb1d
|
Malware Analysis: ohjeongwook/PowerShellRunBox
|
2019-10-05 18:39:16 +07:00 |
|
pe3zx
|
f3831ad9cd
|
Add DFIR ORC
|
2019-09-27 16:23:58 +07:00 |
|
pe3zx
|
cba2fa763f
|
Digital Forensics and Incident Response > CrowdStrike/automactc
|
2019-09-22 21:19:37 +07:00 |
|
pe3zx
|
4af0f359db
|
Cloud Security > nccgroup/ScoutSuite
|
2019-09-22 21:08:18 +07:00 |
|
pe3zx
|
64fc822cd7
|
Binary Analysis > Consecuris/gdbida
|
2019-09-16 11:43:48 +07:00 |
|
pe3zx
|
b0655042c9
|
Vulnerable > appsecco/VyAPI
|
2019-09-16 11:21:15 +07:00 |
|
pe3zx
|
8731325307
|
Binary Analysis > Cutter
|
2019-09-11 19:28:46 +07:00 |
|
pe3zx
|
6852afd7a4
|
Binary Analysis > Cisco-Talos/GhIDA
|
2019-09-11 18:08:28 +07:00 |
|
pe3zx
|
cfafd26258
|
Binary Analysis > Cisco-Talos/Ghidraaas
|
2019-09-11 18:07:39 +07:00 |
|
pe3zx
|
89b6a60c83
|
Post Exploitation > fireeye/SharPersist
|
2019-09-10 01:28:37 +07:00 |
|
pe3zx
|
5e45b4f822
|
Post Exploitation > GhostPack/Seatbelt
|
2019-09-10 01:24:56 +07:00 |
|
pe3zx
|
0346d4e54b
|
DFIR > DG Wingman
|
2019-09-09 18:48:30 +07:00 |
|
pe3zx
|
3f92b5e50a
|
DFIR > SekoiaLab/Fastir_Collector
|
2019-09-09 18:46:55 +07:00 |
|
pe3zx
|
b3ae474bc2
|
DFIR > Live Response Collection - Cedarpelta
|
2019-09-09 18:45:46 +07:00 |
|
pe3zx
|
9f6a5bd54e
|
DFIR > orlikoski/CyLR
|
2019-09-09 18:43:31 +07:00 |
|
pe3zx
|
a44149a64d
|
DFIR > CyberDefenseInstitute/CDIR
|
2019-09-09 18:41:33 +07:00 |
|
pe3zx
|
2c088ed42d
|
Post Exploitation > sud0woodo/DCOMrade
|
2019-09-09 17:56:30 +07:00 |
|
pe3zx
|
adba31a224
|
Binary Analysis > bootleg/ret-sync
|
2019-09-09 17:41:01 +07:00 |
|
pe3zx
|
731f710667
|
Remove 404 link
|
2019-09-09 01:07:34 +07:00 |
|
pe3zx
|
e55837fed3
|
Update link for 'Security Technical Implementation Guides'
|
2019-09-09 01:04:53 +07:00 |
|
pe3zx
|
2eb26b5f88
|
SE and OSINT > CellID Finder
|
2019-09-09 00:25:42 +07:00 |
|
pe3zx
|
9be642c630
|
SE and OSINT > CellMapper
|
2019-09-09 00:23:55 +07:00 |
|
pe3zx
|
bac5afa26d
|
SE and OSINT > OpenCelliD
|
2019-09-09 00:21:32 +07:00 |
|
pe3zx
|
42a9fb14ec
|
Remove Articles.md
|
2019-08-27 16:35:49 +07:00 |
|
pe3zx
|
46588123a2
|
Adversary Simulation > mdsecactivebreach/CACTUSTORCH
|
2019-08-27 15:13:50 +07:00 |
|
pe3zx
|
fd207b77fa
|
Binary Analysis > Go Reverse Engineering Tool Kit
|
2019-08-27 15:07:43 +07:00 |
|
pe3zx
|
a5d001ce2b
|
Mobile Security > apkdetect
|
2019-08-26 21:23:27 +07:00 |
|
pe3zx
|
01c9300dd8
|
Web Application Security > RhinoSecurityLabs/IPRotate_Burp_Extension
|
2019-08-26 21:19:43 +07:00 |
|
pe3zx
|
0e40a23957
|
Binary Analysis > pyGoRE
|
2019-08-26 20:02:50 +07:00 |
|
pe3zx
|
d29510349a
|
Binary Analysis > taviso/loadlibrary
|
2019-08-26 19:45:25 +07:00 |
|
pe3zx
|
fe099fbb1c
|
Post Exploitation > cobbr/Covenant
|
2019-08-26 18:56:01 +07:00 |
|
pe3zx
|
604b1c2242
|
Malware Analysis > nbeede/BoomBox
|
2019-08-21 21:18:33 +07:00 |
|
pe3zx
|
433de68e74
|
Exploits > jollheef/out-of-tree
|
2019-08-21 21:12:07 +07:00 |
|
pe3zx
|
2a194c9936
|
Exploits > itm4n/UsoDllLoader
|
2019-08-21 17:10:32 +07:00 |
|
pe3zx
|
cdc02fddfa
|
Adversary Simulation > Unfetter
|
2019-08-21 16:51:28 +07:00 |
|
pe3zx
|
e2fa7af097
|
DFIR > philhagen/sof-elk
|
2019-08-21 16:42:03 +07:00 |
|
pe3zx
|
8ef29bd798
|
Social Engineering & OSINT > superhedgy/AttackSurfaceMapper
|
2019-08-11 23:16:03 +07:00 |
|
pe3zx
|
fe97a7c3e8
|
Social Engineering and OSINT > GreyNoise Visualizer
|
2019-08-06 19:38:56 +07:00 |
|
pe3zx
|
b37e33cbb3
|
Social Engineering and OSINT > Simple Email Reputation (emailrep)
|
2019-07-31 00:09:50 +07:00 |
|
pe3zx
|
a9c57b3973
|
Digital Forensics and Incident Response > s0md3v/Orbit
|
2019-07-29 19:56:24 +07:00 |
|
pe3zx
|
7f2f753caf
|
Tools > Social Engineering and OSINT > o365-attack-toolkit
|
2019-07-26 16:18:32 +07:00 |
|
pe3zx
|
bae19d0997
|
Malware Analysis > JPCERTCC/MalConfScan
|
2019-06-23 22:22:12 +07:00 |
|
pe3zx
|
b52d172d6a
|
Social Engineering and OSINT > muraenateam/muraena
|
2019-05-22 20:09:31 +07:00 |
|
pe3zx
|
32e1784453
|
Update Travis-CI link and remove 404
|
2019-05-21 18:14:45 +07:00 |
|
pe3zx
|
dbd50b5ac6
|
Malware Analysis > ecstatic-nobel/Analyst-Arsenal
|
2019-05-21 18:11:13 +07:00 |
|
pe3zx
|
6a65576409
|
Malware analysis > google/vxsig
|
2019-05-21 17:37:13 +07:00 |
|
pe3zx
|
51f7434826
|
Reorder hlldz/SpookFlare
|
2019-05-14 18:09:10 +07:00 |
|
pe3zx
|
930261334c
|
Malware Analysis > ntddk/virustream
|
2019-05-14 18:07:28 +07:00 |
|
pe3zx
|
32c4f492f9
|
Malware Analysis > blackorbird/APT_REPORT
|
2019-05-14 18:06:14 +07:00 |
|
pe3zx
|
959fc2a905
|
Malware Analysis > DoctorWebLtd/malware-iocs
|
2019-05-14 18:04:56 +07:00 |
|
pe3zx
|
846193837e
|
Malware Analysis > SpiderLabs/IOCs-IDPS
|
2019-05-14 18:03:23 +07:00 |
|
pe3zx
|
044fb5f9e9
|
Malware Analysis > eset/malware-ioc
|
2019-05-14 18:02:12 +07:00 |
|
pe3zx
|
036030d9e4
|
Malware Analysis > rastrea2r/rastrea2r
|
2019-05-14 17:59:59 +07:00 |
|
pe3zx
|
156bae56e8
|
Malware Analysis > advanced-threat-research/IOCs
|
2019-05-14 17:58:18 +07:00 |
|
pe3zx
|
ae2d50f648
|
Malware Analysis > pan-unit42/iocs
|
2019-05-14 17:56:32 +07:00 |
|
pe3zx
|
cd3ff71032
|
Malware Analysis > fireeye/iocs
|
2019-05-14 17:55:08 +07:00 |
|
pe3zx
|
05c33078e9
|
Vulnerable > AutomatedLab/AutomatedLab
|
2019-05-14 17:44:58 +07:00 |
|
pe3zx
|
fe57761357
|
Adversary Simulation & Emulation > praetorian-code/purple-team-attack-automation
|
2019-05-14 16:52:02 +07:00 |
|
pe3zx
|
f1661482fc
|
Add: [Tools][Post Exploitation] Arvanaghi/SessionGopher
|
2019-05-10 16:52:26 +07:00 |
|
pe3zx
|
58eda7b0d2
|
Add: [Tools][DFIR] PUNCH-Cyber/stoq
|
2019-05-09 15:16:08 +07:00 |
|
pe3zx
|
d7b6b935ec
|
Separate Articles section from README.md
|
2019-05-03 21:23:46 +07:00 |
|
pe3zx
|
333b11a02c
|
Redesign README.md
|
2019-05-03 00:49:56 +07:00 |
|
pe3zx
|
110c2113a8
|
[Tools][DFIR] sans-blue-team/DeepBlueCLI
|
2019-05-02 11:58:02 +07:00 |
|