0dteam / Phishing-Reporter
An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.
☆49Updated last year
Alternatives and similar repositories for Phishing-Reporter:
Users that are interested in Phishing-Reporter are comparing it to the libraries listed below
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆92Updated last week
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- A few XDR Scripts☆18Updated 2 weeks ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Kerberoast Detection Script☆30Updated 5 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- ☆60Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- Collection of scripts to retrieve stored passwords from Veeam Backup☆123Updated 3 months ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆151Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Picus Labs☆44Updated 4 years ago
- ☆65Updated 3 years ago
- My conference presentations☆66Updated last year
- ☆83Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- Powershell Event Tracing Toolbox☆75Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- ☆38Updated 3 years ago
- ASR Configurator, Essentials and Atomic Testing☆38Updated 5 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- Ransomware simulator written in C#☆36Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆318Updated 2 years ago