There are no reviews yet. Be the first to send feedback to the community and the maintainers!
jaws
Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blog postRanSim
Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.Respotter
Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.AdvancedHuntingQueries
Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenantmediator
An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.foxception
Isolated Firefox browser with pre-configured extensions. Customize with your own extensions as needed.github-leak-audit
A GitHub workflow to identify employees that have leaked your organization's codedual-license-templates
Various commercial license templates for dual-license use.CAPy
A Certificate Authority microservice that can generate server/client certificates through an API interfacewinbin.wtf
WinBin.wtf is a Windows file documentation site to help you understand what various Windows files are, what they should do, and other useful information about them.pia-socks
Custom container and deployment configuration for a VPN reverse proxy. Eventually I plan to add compatibility with other VPN providers.flair
Repository for our Compilers class project.dotfiles
My Linux configuration files for easy setupcommander
Cross-platform endpoint agent framework with easy capability addingjailshell
Toy alternative shell mainly for CTF challenges that retains functionality while limiting capability in the event of an adversary gaining shell access. Also includes a honeypot bash emulator.kali-scripts
My scripts that I've made to do things more easily in Kali LinuxLove Open Source and this site? Check out how you can help us