Skip to content
View captnSud0's full-sized avatar
🐚
Is this shell reversed or binded?
🐚
Is this shell reversed or binded?
  • Canada
  • 14:54 (UTC -04:00)

Block or report captnSud0

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
captnSud0/README.md

captnSud0

Information Security Risk Management | Red Teaming | Threat Hunting | CTFs in free time

Pinned Loading

  1. caldera caldera Public

    Forked from mitre/caldera

    Automated Adversary Emulation Platform

    Python

  2. ghidra ghidra Public

    Forked from NationalSecurityAgency/ghidra

    Ghidra is a software reverse engineering (SRE) framework

    Java

  3. howler-api howler-api Public

    Forked from CybercentreCanada/howler-api

    Howler's API. Howler is an application that allows analysts to triage hits and alerts. It provides a way for analysts to efficiently review and analyze alerts generated by different analytics and d…

    Python

  4. mitreattack-python mitreattack-python Public

    Forked from mitre-attack/mitreattack-python

    A python module for working with ATT&CK

    Python

  5. viper viper Public

    Forked from ukncsc/viper

    Binary analysis framework

    Python

  6. windows_event_logging windows_event_logging Public

    Forked from AustralianCyberSecurityCentre/windows_event_logging

    Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technical Guidance for Windows Event Logging.

    PowerShell