0dteam / Phishing-ReporterLinks
An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.
☆53Updated last year
Alternatives and similar repositories for Phishing-Reporter
Users that are interested in Phishing-Reporter are comparing it to the libraries listed below
Sorting:
- Initial triage of Windows Event logs☆105Updated last year
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆95Updated 10 months ago
- Dissect triage scripts for Citrix NetScaler devices☆68Updated 2 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Updated 2 weeks ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Updated 4 years ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Kerberoast Detection Script☆31Updated last year
- Really can protect from ransomware encryption?☆46Updated last year
- ☆44Updated 6 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆99Updated 4 years ago
- ☆69Updated 4 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Updated 3 years ago
- ☆80Updated 2 years ago
- My conference presentations☆87Updated 2 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆63Updated 10 years ago
- Triaging Windows event logs based on SANS Poster☆42Updated 2 months ago
- InfoSec Notes☆60Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- Evtx Log (xml) Browser☆57Updated 2 years ago
- Commands used in Windows penetration tests☆55Updated last week
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Updated 3 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆38Updated 9 months ago
- A tool for auditing network shares in an Active Directory environment☆44Updated 6 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- Picus Labs☆44Updated 4 years ago
- ☆19Updated 4 years ago