Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/riccio8/threatlab
Collection of tools for security purpouse
https://github.com/riccio8/threatlab
assembly cpp cybersecurity golang memo net network processes python security security-tools yara
Last synced: about 5 hours ago
JSON representation
Collection of tools for security purpouse
- Host: GitHub
- URL: https://github.com/riccio8/threatlab
- Owner: riccio8
- License: gpl-3.0
- Created: 2024-08-02T12:31:14.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-12-20T15:20:32.000Z (about 1 month ago)
- Last Synced: 2024-12-20T15:25:06.906Z (about 1 month ago)
- Topics: assembly, cpp, cybersecurity, golang, memo, net, network, processes, python, security, security-tools, yara
- Language: Go
- Homepage:
- Size: 93.3 MB
- Stars: 5
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
README
---
# Offensive & Defensive Tools Repository
![Golang](https://img.shields.io/badge/Golang-Tools-00ADD8?style=flat&logo=go) [![CodeQL Advanced](https://github.com/riccio8/Offensive-defensive-tools/actions/workflows/codeql.yml/badge.svg?branch=main)](https://github.com/riccio8/Offensive-defensive-tools/actions/workflows/codeql.yml) ![Build Status](https://img.shields.io/badge/build-passing-brightgreen) ![Version](https://img.shields.io/badge/version-1.0.0-blue)
[![License: GPL v3](https://img.shields.io/badge/License-GPLv3-blue.svg)](https://www.gnu.org/licenses/gpl-3.0)## **Overview**
This repository includes a collection of tools, resources and libraries designed for offensive and defensive security operations, covering areas such as process and memory analysis, network security, vulnerability detection, and exploit development. It provides a versatile set of resources for researchers, cybersecurity professionals, and developers.
## **Directory Structure**
- **`lib/`**: Core libraries and DLLs for various security-related tasks.
- Includes C++, Python, Go, and Assembly-based libraries for memory, network, and sandboxing functionalities.
- **`shellcodes/`**: Pre-built shellcode examples for penetration testing and exploit development.
- Contains scripts for reverse shells, directory hiding, and more.- **`src/`**: Main source files for various projects.
- **`Mem/`**: Tools for memory analysis, hex viewers, ROP chain detection, and system calls management.
- **`net/`**: Network-related utilities focusing on DOS/DDOS testing and network resilience.
- **`processes/`**: Process monitoring and manipulation tools, including privilege escalation scripts and anti-debugging mechanisms.
- **`resources/`**: That's a directory containing documents, videos and some other resources than may help u understanding deeply some args, for both beginners and advanced
- **`rules/`**: YARA rules for malware detection, ransomware identification, keylogging detection, and other threat signatures.## **Key Features**
- **Process & Memory Analysis**:
Identify and analyze running processes, heap memory, and vulnerabilities in real-time.- **Network Security Tools**:
Utilities designed to simulate and analyze various network threats like DOS and DDOS attacks.- **Sandboxing**:
Isolated environments for malware testing and secure code execution.- **Cross-Platform Capabilities**:
Primarily focused on Windows, with some support for Linux environments.## **Technologies Used**
- **Assembly**: For low-level system manipulation.
- **C++**: High-performance process and memory handling tools.
- **Golang**: Lightweight and efficient network and process utilities.
- **Python**: Scripting for process automation and vulnerability detection.
- **YARA**: Advanced threat detection through rule-based signatures.## **Disclaimer**
⚠️ **Disclaimer**: All tools in this repository are intended for **educational and legal security research purposes only**. Misuse of these tools for malicious purposes is strictly prohibited. The author takes no responsibility for any illegal use.
---
*Note: Continuous improvement is ongoing, especially for assembly-related tools!*