Giter Club home page Giter Club logo

Josh Mason's Projects

365inspect icon 365inspect

A PowerShell script that automates the security assessment of Microsoft Office 365 environments.

adgenerator icon adgenerator

Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.

airgeddon icon airgeddon

This is a multi-use bash script for Linux systems to audit wireless networks.

autoblue-ms17-010 icon autoblue-ms17-010

This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010

awesome-pentest icon awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things

blue-team-wiki icon blue-team-wiki

Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries

c-cheatsheet icon c-cheatsheet

A MEMORY DUMP OF C PROGRAMMING, by Sean Eyre (@oni49) and Stephen Semmelroth (@stephensemmelroth / @diodepack) of Rainier Cyber. This document is intended to provide you a quick desk reference for Cā€™s syntax and semantics. We included several example programs that will elaborate on each section in greater detail.

cybersecurity-debrief-checklist icon cybersecurity-debrief-checklist

This checklist can be used by cybersecurity teams to hone in on the good, the bad, and the ugly of an operation. From a pentest, to an incident response case, from a risk assessment, to a table top scenario, or even more.

grassmarlin icon grassmarlin

Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber

h4cker icon h4cker

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

hacking icon hacking

Source code from Hacking: The Art of Exploitation (Second Edition).

ics-security-study-resources icon ics-security-study-resources

A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.

irm icon irm

Incident Response Methodologies 2022

osx-re-101 icon osx-re-101

A collection of resources for OSX/iOS reverse engineering.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.