Giter VIP home page Giter VIP logo

Steve's Projects

kubernetes-goat icon kubernetes-goat

Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.

kubescape icon kubescape

kubescape is the first tool for testing if Kubernetes is deployed securely as defined in Kubernetes Hardening Guidance by to NSA and CISA (https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/)

kuiper icon kuiper

Digital Forensics Investigation Platform

kustquerylanguage_kql icon kustquerylanguage_kql

Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting

laurel icon laurel

Transform Linux Audit logs for SIEM usage

ldapmonitor icon ldapmonitor

Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

ldapnomnom icon ldapnomnom

Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)

ldd2bh icon ldd2bh

Convert ldapdomaindump to Bloodhound

limeaide icon limeaide

A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host.

limon icon limon

Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect Linux malware before execution, during execution, and after execution (post-mortem analysis) by performing static, dynamic and memory analysis using open source tools

linux-privilege-escalation icon linux-privilege-escalation

This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machines and CTFs with examples.

log4j-finder icon log4j-finder

Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)

log4j-scanner icon log4j-scanner

log4j-scanner is a project derived from other members of the open-source community by CISA's Rapid Action Force team to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.

log4j-scanner-1 icon log4j-scanner-1

Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.

logontracer icon logontracer

Investigate malicious Windows logon by visualizing and analyzing Windows event log

loki icon loki

Loki - Simple IOC and Incident Response Scanner

lolbas icon lolbas

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

ma2tl icon ma2tl

macOS forensic timeline generator using the analysis result DBs of mac_apt

maad-af icon maad-af

MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Azure AD.

mail_to_misp icon mail_to_misp

Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.