mmmmmmmmmmmm
     mmm        mmm              
    mm            mm             
    mm            mm             
   mm              mm
   mm              mm            
   mm              mm            
   mm              mm            
  UUUUUUUUUUUUUUUUUUUU           
  UUUUUUUUUUUUUUUUUUUU           
  UUUUUUUUU   UUUUUUUU           
  UUUUUUUU     UUUUUUU           
  UUUUUUUUU   UUUUUUUU           
   UUUUUUUI   IUUUUUU            
   UUUUUUUI   IUUUUUU            
    UUUUUUUuuuUUUUUU             
     UUUUUUUUUUUUUU
Security Tooling Aggregator by  @dtmsecurity - API
sailay1996 : SpoolTrigger ★79 ⑂12
tothi : f89a37127f2233352d74eef6c748ca25
kris-nova : kush ★15 ⑂0
ivigamberdiev : 9705621088359bd1a7cceca53608875f HTML
dmchell : 478d83f369260bd4e4cd380712f6bb6e C#
mubix : c74d9998944651776982865e7fac5e4f JSON
fortalice : bofhound TOML ★60 ⑂7
Pear1y : CVE-2022-26133 Python ★110 ⑂26
ZephrFish : F5-CVE-2022-1388-Exploit Python ★40 ⑂22
FuzzySecurity : WWHF-WayWest-2022 ★29 ⑂0
paranoidninja : Brute-Ratel-External-C2-Specification ★7 ⑂2
Sq00ky : SMB-Session-Spoofing ★56 ⑂7
secretsquirrel : encryptAgit TOML ★20 ⑂0
xforcered : SQLRecon ★60 ⑂6
h4x0r-dz : be69c7533075ab0d3f0c9b97f7c93a59
davidortinau : dotnet-maui-samples ★25 ⑂4
hakluke : hakoriginfinder Go ★228 ⑂24
NVIDIA : open-gpu-kernel-modules Makefile ★11096 ⑂721
forrest-orr : WizardOpium HTML ★43 ⑂11
med0x2e : NTLMRelay2Self ★251 ⑂29
EspressoCake : BeaconDownloadSync ★73 ⑂4
ayadim : nuclei-templates ★36 ⑂10
tothi : bf6c59d6de5d0c9710f23dae5750c4b9
AutomoxSecurity : iShelly Python ★8 ⑂0
trustedsec : ELFLoader ★142 ⑂26
puzzlepeaches : rnotify TOML ★2 ⑂0
trustedsec : CS-Remote-OPs-BOF ★299 ⑂42
Dec0ne : KrbRelayUp ★888 ⑂113
d4rckh : nimc2 Nimrod ★124 ⑂9
DebugPrivilege : CPP C++ ★44 ⑂7
outflanknl : C2-Tool-Collection ★460 ⑂62
khalednassar : CVE-2022-21449-TLS-PoC ★109 ⑂24
mandiant : thiri-notebook ★110 ⑂10
Grazee : CVE-2022-1329-WordPress-Elementor-RCE ★1 ⑂0
HuskyHacks : RustyTokenManipulation ★14 ⑂4
Antonlovesdnb : c85053f4171bfa92a7ea4b0b56e5c50e
mcdulltii : CVE-2022-1329 Python ★8 ⑂7
kagancapar : CVE-2022-29072 YAML ★663 ⑂109
AkuCyberSec : CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit Python ★8 ⑂3
malwarejake-public : packets ★2 ⑂2
rootkit-io : awesome-malware-development ★141 ⑂18
grigoritchy : pocs ★62 ⑂11
invictus-0x90 : 2e1ebcfefd8d7478e695131b88ce2926 Text only
invictus-ir : Invictus-AWS Python ★24 ⑂3
nayjones : inflate.py Python ★90 ⑂10
HuskyHacks : CobaltNotion ★46 ⑂13
cedowens : ioreg-and-sysctl-examples ★6 ⑂0
GhostPack : Invoke-Evasion ★111 ⑂11
singe : b300fbeb9723b06cf882ddb1d66c9466 Bash
byt3bl33d3r : tailscalesd TOML ★6 ⑂3
realoriginal : 56158a6a8ea118baf358e5ae87ffabec
onurgule : S4S-Scanner ★59 ⑂24
Raz0r : semgrep-smart-contracts ★207 ⑂18
SwitHak : 0be6e857174d6ba2a6973f9ff9030c94
NCSC-NL : spring4shell ★171 ⑂33
pwn1sher : frostbyte ★225 ⑂23
Retrospected : spring-rce-poc ★84 ⑂23
scrt : avdebugger JSON ★58 ⑂8
dinosn : CVE-2022-22963 YAML ★94 ⑂35
daem0nc0re : AtomicSyscall ★101 ⑂20
IcebreakerSecurity : PersistBOF ★112 ⑂22
IcebreakerSecurity : DelegationBOF C ★96 ⑂17
skahwah : a585e176e4a5cf319b0c759637f5c410 C#
doulos0 : hackinglz ★3 ⑂1
VirtualAlllocEx : Shellcode-Downloader-CreateThread-Execution ★129 ⑂32
shogunlab : Mochi ★81 ⑂10
Wra7h : ARCInject ★88 ⑂15
nmantani : archiver-MOTW-support-comparison ★39 ⑂3
KeenSecurityLab : BinAbsInspector Groovy ★989 ⑂144
Sh0ckFR : DLLirant Python ★211 ⑂33
breakpointHQ : TCC-ClickJacking Swift ★52 ⑂9
nonamecoder : CVE-2022-27254 ★335 ⑂43
waldo-irc : YouMayPasser Python ★127 ⑂32
Dhaiwat10 : create-web3-frontend TypeScript ★83 ⑂6
tyranid : c24cfd1bd141d14d4925043ee7e03c82 C++
snovvcrash : KeeThief ★74 ⑂9
nerdprof : BsidesRoc-2022 ★2 ⑂0
arch4ngel : sec-vault-gen Python ★58 ⑂7
Antonlovesdnb : 1c9f32237794be08a1d8ca347e4ccce5
PwnDefend : NetworkAttackMap ★34 ⑂4
frank2 : oxide Rust ★41 ⑂3
jhftss : CVE-2022-22639 Objective-C ★100 ⑂17
joe-desimone : 654cd1aef6ae5b9c3e0af7e1c42e2e06 C++
awslabs : aws-automated-incident-response-and-forensics ★261 ⑂27
NtQuerySystemInformation : CustomKeyboardLayoutPersistence ★133 ⑂28
AlexisAhmed : CVE-2022-0847-DirtyPipe-Exploits C ★268 ⑂63
NotMedic : 6e027bb3dc9f512b68e69de08a20be7d HTML
datadog : dirtypipe-container-breakout-poc ★71 ⑂12
nettitude : SyscallsExtractor ★22 ⑂2
cube0x0 : SyscallPack ★215 ⑂40
MythicAgents : tetanus ★145 ⑂12
paranoidninja : O365-Doppelganger ★208 ⑂27
klezVirus : SysWhispers3 Python ★475 ⑂75
microsoft : routeros-scanner Python ★734 ⑂107
rootsecdev : pyKerbrute Python ★10 ⑂4
HuskyHacks : RustyProcessInjectors ★75 ⑂8
chvancooten : CloudLabsAD ★198 ⑂24
alfarom256 : StinkyLoader ★70 ⑂12
cxnder : bn-dyldsharedcache Python ★68 ⑂3
0vercl0k : CVE-2022-21971 ★270 ⑂58
0vercl0k : CVE-2022-21974 ★49 ⑂11
curated-intel : Ukraine-Cyber-Operations ★799 ⑂86
mez-0 : YaraEngine ★1 ⑂1
woanware : etw-event-dumper ★26 ⑂4
cube0x0 : LdapSignCheck ★99 ⑂13
Allevon412 : TeamsImplant Python ★165 ⑂35
jsecurity101 : 6b9e87f5a428f31d41ffc8c1ee05a999 PowerShell
icyguider : Nimcrypt2 Nimrod ★310 ⑂67
johnnyxmas : 7a2e78a1d46512c0b1d9c1f8b3a03ee9
N7WEra : BofAllTheThings Text only ★128 ⑂28
secureworks : family-of-client-ids-research Text only ★29 ⑂3
parsdefense : ios-kernel-heap-profiler ★75 ⑂10
cube0x0 : BofRoast ★152 ⑂25
Cracked5pider : ShellcodeTemplate ★311 ⑂57
PwnDefend : RPDHoneyNet ★9 ⑂1
0xsha : 0859033e1777490576923a27fbcd23ac Python
Dramelac : GoldenCopy Python ★42 ⑂8
parsdefense : CVE-2021-1965 C ★152 ⑂28
jweny : zabbix-saml-bypass-exp ★84 ⑂35
mpgn : BackupOperatorToDA ★203 ⑂37
pr0xylife : Qakbot Text only ★22 ⑂3
cube0x0 : KrbRelay ★586 ⑂77
tothi : SharpStay ★65 ⑂11
FortyNorthSecurity : RandomScripts ★12 ⑂6
memN0ps : arsenal-rs ★26 ⑂4
pr0xylife : IcedID Text only ★4 ⑂0
mgeeky : PackMyPayload Python ★290 ⑂46
mlcsec : SharpSQL ★60 ⑂8
puzzlepeaches : msprobe TOML ★82 ⑂6
Flangvik : CobaltBus ★169 ⑂31
trustedsec : User-Behavior-Mapping-Tool Python ★89 ⑂12
bugch3ck : SharpLdapWhoami ★46 ⑂6
jsa2 : aadcookiespoof JavaScript+Genshi Text ★23 ⑂3
Cerbersec : KillDefenderBOF C ★150 ⑂20
S3cur3Th1sSh1t : Nim-RunPE Nimrod ★148 ⑂20
LeeHolmes : wordle-open-recovery-data-system HTML ★0 ⑂0
p0dalirius : RDWArecon Python ★48 ⑂7
L4ys : CVE-2022-21882 C++ ★156 ⑂42
pwn1sher : KillDefender C++ ★519 ⑂93
ORCA666 : T.D.P
xenoscr : manual-syscall-detect ★65 ⑂13
thefLink : RecycledGate ★224 ⑂35
RedTeamOperations : Advanced-Process-Injection-Workshop ★466 ⑂96
TheCloudScout : sentinel-pricing ★2 ⑂2
mrd0x : EvilSelenium C# ★499 ⑂71
dosxuz : DefenderStop C# ★139 ⑂26
qtc-de : a87b2c97fd9e0330ad2dc67789a62ba5 PowerShell
S3cur3Th1sSh1t : NimGetSyscallStub ★125 ⑂24
merces : entropy JSON ★36 ⑂7
arata-nvm : mitnal ★470 ⑂7
KaLendsi : CVE-2022-21882 NASM ★414 ⑂128
pr0xylife : Emotet Text only ★39 ⑂5
chvancooten : NimPackt-v1 Python ★287 ⑂40
hlldz : RefleXXion ★344 ⑂63
MythicAgents : Athena ★77 ⑂10
mhaskar : b6bb8d5eaf676281565ca2ac4c4ca100 C
waldo-irc : MalMemDetect ★119 ⑂28
zyn3rgy : LdapRelayScan Python ★233 ⑂24
Cerbersec : Ares ★275 ⑂46
snovvcrash : VeraCryptThief ★184 ⑂35
shogunlab : Sukoshi ★31 ⑂2
frkngksl : ParallelNimcalls Nimrod ★101 ⑂13
EspressoCake : 4910a11d4f678da9c46505fda58f582f
N1ght-W0lf : fd00f58511786c7a4e8e4a4440703b82
cube0x0 : ParallelSyscalls C# ★130 ⑂27
paranoidninja : EtwTi-Syscall-Hook NASM ★173 ⑂29
slyd0g : log4j-honeypot-flask ★4 ⑂0
Cracked5pider : 8f6196b4da16368318a75ff3b1836195 C
EspressoCake : 3c7743742840992c7d7424d569ae5e02 JavaScript+Genshi Text
BinaryDefense : log4j-honeypot-flask ★141 ⑂22
Yaxser : COFFLoader2 C ★107 ⑂30
ly4k : Pachine Python ★226 ⑂32
DallasFR : Cobalt-Clip Bash ★67 ⑂15
cyberstruggle : L4sh Python ★254 ⑂67
kafkaesqu3 : SharpStomp C# ★17 ⑂4
cisagov : log4j-affected-db ★1094 ⑂296
ridter : nopac Python ★345 ⑂70
fullhunt : log4j-scan Text only ★2884 ⑂710
S3cur3Th1sSh1t : 0ed2fb0b5ae485b68cbc50e89581baa6 PowerShell
Malwar3Ninja : Exploitation-of-Log4j2-CVE-2021-44228 ★10 ⑂3
NCSC-NL : log4shell ★1880 ⑂660
cube0x0 : noPac ★1090 ⑂288
proferosec : log4jScanner ★475 ⑂47
WazeHell : sam-the-admin Python ★799 ⑂172
Neo23x0 : log4shell-detector Python ★723 ⑂133
maxsam4 : bad-lending-demo JSON ★24 ⑂4
karanlyons : 8635587fd4fa5ddb4071cc44bb497ab6 Python
SwitHak : b66db3a06c2955a9cb71a8718970c592
Cybereason : Logout4Shell ★1726 ⑂116
nathanqthai : 01808c569903f41a52e7e7b575caa890
superducktoes : 9b742f7b44c71b4a0d19790228ce85d8
mubix : CVE-2021-44228-Log4Shell-Hashes ★152 ⑂39
snovvcrash : 3bf1a771ea6b376d374facffa9e43383 Python
christophetd : log4shell-vulnerable-app Batchfile ★984 ⑂438
cert-ee : cuckoo3 Bash ★372 ⑂27
f0wl : blackCatConf ★18 ⑂2
Neo23x0 : e4c8b03ff8cdf1fa63b7d15db6e3860b
leonjza : log4jpwn Maven ★299 ⑂81
HyCraftHD : Log4J-RCE-Proof-Of-Concept Batchfile ★181 ⑂34
tangxiaofeng7 : apache-log4j-poc Maven ★13 ⑂10
tangxiaofeng7 : CVE-2021-44228-Apache-Log4j-Rce Maven ★13 ⑂10
airbus-cert : Invoke-Bof PowerShell ★191 ⑂28
xforcered : xPipe C ★53 ⑂13
mandiant : heyserial Python ★105 ⑂17
matterpreter : FindETWProviderImage ★51 ⑂7
Cyb3r-Monk : RITA-J ★125 ⑂17
jbaines-r7 : shakeitoff ★69 ⑂11
cedowens : EntitlementCheck Python ★67 ⑂7
daem0nc0re : SharpWnfSuite ★79 ⑂14
Wh04m1001 : Random C++ ★21 ⑂2
leonjza : adventofcode ★1 ⑂0
Alh4zr3d : OffensiveNim ★12 ⑂0
KQLCafe : website ★7 ⑂0
jonaslyk : temp C++ ★43 ⑂13
FDlucifer : Proxy-Attackchain ★178 ⑂45
sbasu7241 : 148a60d6831dc31e854f59f2951f7989 C#
0xsp-SRD : mortar ★760 ⑂145
Its-Vichy : GoriaNet ★61 ⑂14
V1V1 : OffensiveAutoIt ★338 ⑂45
SpiralBL0CK : Browser-Pwning- ★169 ⑂13
connormcgarr : tgtdelegation Bash ★90 ⑂15
deepinstinct : DeMotet Text only ★42 ⑂6
klinix5 : InstallerFileTakeOver ★1666 ⑂424
p0dalirius : webapp-wordlists ★302 ⑂74
testanull : 0188c1ae847f37a70fe536123d14f398 Python
snovvcrash : 35773330434e738bd86155894338ba4f C#
Wra7h : 69a03c802ae6977e74b1152a4b004515 C#
S3cur3Th1sSh1t : MultiPotato ★420 ⑂73
securepeacock : DeTTECT ★0 ⑂0
slyd0g : SwiftLiverpool ★3 ⑂1
optiv : Ivy ★569 ⑂103
jorgeorchilles : presentations ★8 ⑂0
dievus : Oh365UserFinder Python ★330 ⑂65
Sh0ckFR : InlineWhispers2 Python ★134 ⑂25
ad-995 : bluffy Python ★229 ⑂41
kyleavery : TitanLdr ★80 ⑂21
securifybv : Visual-Studio-BOF-template ★134 ⑂29
CCob : lsarelayx ★429 ⑂47
N4kedTurtle : LocalDllParse ★49 ⑂13
helpsystems : nanodump ★768 ⑂112
nodauf : GoMapEnum ★278 ⑂42
wavestone-cdt : EdrSandblast ★527 ⑂101
kartikdurg : Enum-LSASS C ★17 ⑂4
bishopfox : unredacter HTML ★5260 ⑂505
phrutis : Rotor-Cuda ★59 ⑂21
netero1010 : ScheduleRunner ★236 ⑂35
tihanyin : PSSW100AVB PowerShell ★733 ⑂117
p0dalirius : FindUncommonShares Python ★118 ⑂16
codewhitesec : HandleKatz Python ★371 ⑂75
SentineLabs : AlphaGolang ★279 ⑂39
sslivkoff : toolstr ★1 ⑂0
snovvcrash : DInjector ★435 ⑂93
treebuilder : aad-sso-enum-brute-spray PowerShell ★183 ⑂37
icyguider : Shhhloader C ★324 ⑂65
Edubr2020 : CVE-2021-40444--CABless ★99 ⑂24
XiaoliChan : wmiexec-RegOut Python ★195 ⑂22
cube0x0 : SharpSystemTriggers ★259 ⑂29
darkquasar : AzureHunter ★518 ⑂65
snovvcrash : NimHollow Nimrod ★223 ⑂43
knight0x07 : ImpulsiveDLLHijack ★298 ⑂75
pwn1sher : WMEye ★263 ⑂48
aaaddress1 : PR0CESS ★478 ⑂85
MHaggis : 66dd0bf532e6dee15db2af7acf57667f XML
pussycat0x : malicious-pdf Python ★162 ⑂20
boku7 : BokuLoader ★654 ⑂133
jfmaes : LazySign PowerShell ★451 ⑂67
reprise99 : Sentinel-Queries ★494 ⑂96
KasRoudra : PyPhisher Python ★302 ⑂55
Tylous : SourcePoint ★601 ⑂94
SharpC2 : SharpC2 ★327 ⑂56
benheise : ad7f2adb605a7ec216a506e821705a06 Text only
ovotech : gitoops ★587 ⑂43
gladiatx0r : 1ffe59031d42c08603a3bde0ff678feb
fozavci : TradecraftDevelopment-Fundamentals ★38 ⑂12
0vercl0k : wtf ★897 ⑂68
MythicAgents : Apollo ★326 ⑂50
byt3bl33d3r : OffensiveNim ★1605 ⑂215
PwnDefend : wallpapers ★12 ⑂0
xforcered : StandIn ★238 ⑂30
CCob : BOF.NET CMake ★383 ⑂61
bohops : UltimateWDACBypassList ★243 ⑂36
Cloud-Architekt : AzureAD-Attack-Defense ★617 ⑂100
Sysinternals : SysmonForLinux Bash ★1066 ⑂121
kleiton0x00 : Advanced-SQL-Injection-Cheatsheet ★1181 ⑂331
vxunderground : VXUG-Papers Text only ★649 ⑂151
vxunderground : MalwareSourceCode ★10224 ⑂1120
dnif : content ★17 ⑂5
Chick3nman : e4fcee00cb6d82874dace72106d73fef
SecuProject : ADenum Python ★209 ⑂43
saeidshirazi : awesome-android-security ★909 ⑂142
artsploit : rogue-jndi Maven ★68 ⑂11
chvancooten : BugBountyScanner Bash ★514 ⑂76
redcanaryco : AtomicTestHarnesses ★159 ⑂27
rxwx : chlonium ★167 ⑂36
projectdiscovery : mapcidr ★407 ⑂47
Unknow101 : FuckThatPacker ★489 ⑂73
elddy : nimscan INI ★253 ⑂25
bhassani : doublepulsar Makefile ★17 ⑂2
microsoft : restler-fuzzer Python ★1611 ⑂183
scythe-io : purple-team-exercise-framework ★235 ⑂34
C-Sto : BananaPhone ★304 ⑂41
nccgroup : nccfsas ★554 ⑂113
juanfont : headscale Go ★4605 ⑂263
slyd0g : DLLHijackTest ★251 ⑂49
mandiant : capa-rules Text only ★312 ⑂105
mallorybowes : chrome-mal-ids Text only ★19 ⑂11
xorrior : macOSTools Python ★221 ⑂28
elastic : detection-rules ★1160 ⑂259
optiv : Talon Go ★301 ⑂59
R0ckNRolla : doublepulsar-rdp C ★0 ⑂0
Flangvik : SharpCollection ★1288 ⑂197
christophetd : Adaz ★297 ⑂63
chip-red-pill : IntelTXE-PoC Python ★121 ⑂15
pry0cc : axiom ★2682 ⑂432
rvrsh3ll : Azure-App-Tools ★42 ⑂8
cybercdh : kitphishr ★168 ⑂26
Flangvik : NetLoader ★532 ⑂120
bats3c : shad0w Python ★1695 ⑂286
glebarez : cero ★278 ⑂46
OTRF : infosec-jupyterthon ★66 ⑂16
r4v1np1nk : HackersKitchen Text only ★53 ⑂4
dotnet : maui-samples ★921 ⑂152
jsecurity101 : Marvel-Lab ★81 ⑂9
earthquake : Socks5Server ★60 ⑂8
dirkjanm : ROADtools YAML ★829 ⑂139
outflanknl : TamperETW ★142 ⑂24
BBVA : susto ★35 ⑂2
rootsecdev : Azure-Red-Team ★852 ⑂121
pathtofile : Sealighter JSON ★94 ⑂14
horsicq : PDBRipper C++ ★514 ⑂69
hausec : PowerZure ★716 ⑂122
HyperDbg : HyperDbg ★1379 ⑂214
jstrosch : malware-samples ★959 ⑂155
Kharos102 : IOCTLDump ★93 ⑂25
Alekseyyy : phineas-philes Text only ★58 ⑂16
Azure : Azure-Network-Security JSON ★406 ⑂150
panther-labs : panther-analysis Text only ★163 ⑂67
kellyjonbrazil : jc Python ★3735 ⑂75
welk1n : JNDI-Injection-Exploit Maven ★1836 ⑂652
jstrosch : learning-malware-analysis ★108 ⑂20
hakluke : how-to-exit-vim ★5833 ⑂285
h0mbre : Learning-C ★831 ⑂151
slyd0g : PrimaryTokenTheft ★194 ⑂48
moohax : Talks ★22 ⑂1
3xpl01tc0d3r : ProcessInjection ★706 ⑂132
bfuzzy1 : auditd-attack ★54 ⑂13
zadewg : RIUS Bash ★78 ⑂9
BC-SECURITY : Empire TOML ★2579 ⑂400
GhostManager : Ghostwriter YAML ★600 ⑂108
scythe-io : community-threats ★464 ⑂62
gtworek : PSBits ★1451 ⑂306
rxhanson : Rectangle ★16944 ⑂484
alexverboon : MDATP ★305 ⑂44
FuzzySecurity : Fermion Text only ★434 ⑂61
OTRF : Set-AuditRule PowerShell ★65 ⑂19
decalage2 : awesome-security-hardening ★2162 ⑂280
dirkjanm : adidnsdump ★525 ⑂73
omerbenamram : evtx ★351 ⑂33
shellfarmer : WeakestLink JavaScript ★82 ⑂5
sbousseaden : EVTX-ATTACK-SAMPLES PowerShell ★1664 ⑂320
tyranid : infosec-presentations ★136 ⑂11
microsoft : msticpy YAML ★875 ⑂173
ukncsc : lme ★632 ⑂95
ustayready : fireprox Python ★1144 ⑂167
dotcomboom : Pituophis Python ★27 ⑂0
sophoslabs : IoCs Text only ★311 ⑂65
microsoft : snmalloc ★933 ⑂82
microsoft : AaronLocker ★446 ⑂67
FuzzySecurity : Sharp-Suite ★917 ⑂196
stvemillertime : f518d598097eb657a215795950ff8b8d
horsicq : Nauz-File-Detector CMake ★387 ⑂68
mitre-attack : car Text only ★679 ⑂202
olafhartong : ThreatHunting Text only ★926 ⑂161
olafhartong : Presentations ★36 ⑂8
yoda66 : RIRTools Python ★2 ⑂2
GhostPack : Rubeus ★2412 ⑂528
GhostPack : SharpDPAPI ★682 ⑂138
azure : azure-sentinel YAML ★2281 ⑂1621
threatexpress : malleable-c2 ★935 ⑂200
RfidResearchGroup : proxmark3 Makefile ★1663 ⑂573
jasonreisman : Timeline Python ★417 ⑂49
microsoft : Windows-classic-samples ★3461 ⑂2636
trustedsec : ptf Bash ★4245 ⑂1127
Yara-Rules : rules Bash ★3076 ⑂826
Kevin-Robertson : Inveigh PowerShell ★1820 ⑂377
hfiref0x : UACME YAML ★4316 ⑂1092
osquery : osquery CMake ★18902 ⑂2301
NLua : NLua ★1555 ⑂272
aws : aws-sdk-js ★7035 ⑂1480
zer0fl4g : DebugDetector ★102 ⑂62