0sm0s1z / SiriusLinks
☆21Updated 2 years ago
Alternatives and similar repositories for Sirius
Users that are interested in Sirius are comparing it to the libraries listed below
Sorting:
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Active Directory Purple Team Playbook☆115Updated 2 years ago
- ☆67Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆144Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆107Updated 3 months ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆152Updated last year
- ☆50Updated this week
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆72Updated last month
- Conference presentations☆60Updated 2 months ago
- ☆43Updated 2 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆156Updated last year
- Easily create index of your SANS books☆19Updated 3 years ago
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 9 months ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Pushes Sysmon Configs☆90Updated 4 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- ☆29Updated 5 years ago
- A list of RMMs designed to be used in automation to build alerts☆117Updated 2 months ago
- Defensive Origins Training Schedule☆39Updated 2 years ago
- ☆73Updated 2 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- ☆150Updated 4 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- The PoLRBear Project☆35Updated 4 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Jupyter notebooks☆25Updated 5 years ago