Skip to content
View benetsi's full-sized avatar

Block or report benetsi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Linux kernel source tree

C 178,807 53,329 Updated Sep 21, 2024

File formats dissections and more...

Assembly 10,451 734 Updated Feb 18, 2024

awesome-linux-rootkits

1,677 235 Updated Jan 27, 2023

Using ftrace for function hooking in Linux kernel

C 252 70 Updated Mar 21, 2021

RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware pre-encryption.

488 38 Updated May 31, 2024

Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.

C 628 114 Updated Mar 5, 2024

Common PHP webshells you might need for your Penetration Testing assignments or CTF challenges. Do not host the file(s) on your server!

PHP 1,871 774 Updated Mar 3, 2021

Free Images for EVE-NG and GNS3 containing routers, switches,Firewalls and other appliances, including Cisco, Fortigate, Palo Alto, Sophos and more. Master the art of networking and improve your sk…

HTML 596 149 Updated Aug 14, 2024

Tools and Techniques for Blue Team / Incident Response

2,715 420 Updated Apr 2, 2024

A latent text-to-image diffusion model

Jupyter Notebook 67,590 10,088 Updated Jun 18, 2024

Simple random DNS, HTTP/S internet traffic noise generator

Python 1,670 235 Updated Nov 25, 2023

A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.

Python 1,615 180 Updated Sep 5, 2023

Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!

1,361 180 Updated Sep 10, 2024

Windows Exploit Suggester - Next Generation

Python 4,133 556 Updated Sep 14, 2024

SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be r…

PowerShell 1,203 169 Updated Nov 22, 2022

Tools, tips, tricks, and more for exploring ICS Security.

HTML 1,607 433 Updated Aug 2, 2024

Main Sigma Rule Repository

Python 8,125 2,159 Updated Sep 18, 2024

Rules generated from our investigations.

Shell 187 31 Updated Aug 2, 2024
YARA 521 69 Updated Dec 4, 2023

Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2

Assembly 177 30 Updated Jul 21, 2022

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 15,611 1,738 Updated Jul 10, 2024

Sysmon configuration file template with default high-quality event tracing

4,741 1,698 Updated Jul 3, 2024

Lnk Explorer Command line edition!!

C# 266 29 Updated Jun 14, 2024

Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.

PowerShell 47 18 Updated Mar 19, 2015

Dockerfile examples

Shell 572 468 Updated Sep 9, 2016

scripts to setup environments for red/blue teams.

Shell 16 1 Updated Nov 30, 2023

Utility to execute ELF binary directly from stdin pipe.

C 60 8 Updated Oct 25, 2022
Next