- Washington D.C
Lists (1)
Sort Name ascending (A-Z)
Stars
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readines…
An increasingly less-brief guide to Mastodon
Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.
Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of those packets. Discussion/announcements at stenographer@goo…
Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall to dump in-memory PE files and reconstruct imports.
The Elastic stack (ELK) powered by Docker and Compose.
A list of cyber-chef recipes and curated links
This repository contains the notebooks and presentations we use for our Databricks Tech Talks
A tutorial on the most important features and idioms of Scala that you need to use Spark's Scala APIs.
A user-mode application authorization system for MacOS written in Swift
These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok
A self-hosted data logger for your Tesla 🚘
Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscal…
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
The FLARE team's open-source tool to identify capabilities in executable files.
This is the development tree. Production downloads are at:
An Active Defense and EDR software to empower Blue Teams
A Splunk Technology Add-on to forward filtered ETW events.
A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).