0dteam / Phishing-ReporterLinks
An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.
☆51Updated last year
Alternatives and similar repositories for Phishing-Reporter
Users that are interested in Phishing-Reporter are comparing it to the libraries listed below
Sorting:
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆94Updated 5 months ago
- Initial triage of Windows Event logs☆102Updated last year
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆155Updated 3 years ago
- ☆80Updated 2 years ago
- ☆160Updated last year
- Azure AD enumeration over MS Graph☆83Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Kerberoast Detection Script☆30Updated 10 months ago
- ☆43Updated last month
- ☆68Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- My conference presentations☆82Updated 3 weeks ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆59Updated 10 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- A few XDR Scripts☆22Updated 5 months ago
- Really can protect from ransomware encryption?☆46Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆95Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- ☆38Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆25Updated 11 months ago
- Commands used in Windows penetration tests☆54Updated 3 years ago
- ☆19Updated 4 years ago
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago