0sm0s1z / SiriusLinks
☆21Updated 2 years ago
Alternatives and similar repositories for Sirius
Users that are interested in Sirius are comparing it to the libraries listed below
Sorting:
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Active Directory Purple Team Playbook☆113Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆140Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆151Updated last year
- ☆42Updated 2 years ago
- ☆47Updated last week
- ☆67Updated 4 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆69Updated 2 weeks ago
- Conference presentations☆59Updated this week
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- The PoLRBear Project☆35Updated 4 years ago
- ☆29Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Jupyter notebooks☆25Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆157Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 10 months ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated 2 weeks ago
- Random tips and tricks RE: ransomware☆14Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 7 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- Purple Team Security☆75Updated 3 years ago
- powershell script to simulate activity by a user☆21Updated 5 years ago
- Defensive Origins Training Schedule☆38Updated last year
- ☆151Updated 4 years ago
- ☆43Updated 4 years ago