0xAnalyst / awesome-email-securityLinks
A curated list of awesome resources related to enhancing your enterprise Email Security
☆57Updated 10 months ago
Alternatives and similar repositories for awesome-email-security
Users that are interested in awesome-email-security are comparing it to the libraries listed below
Sorting:
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆148Updated this week
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Updated last year
- ☆74Updated 3 weeks ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆153Updated last month
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆103Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆141Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆129Updated 3 months ago
- ☆100Updated 6 months ago
- https://lolad-project.github.io/☆84Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Cyber threat intelligence tool suite.☆42Updated 10 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Living Off Security Tools☆58Updated 2 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆65Updated 3 weeks ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- ☆29Updated 3 years ago
- AppLocker Policy Generator☆25Updated 5 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- ShellSweeping the evil.☆181Updated last year
- ☆117Updated last month
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Updated 4 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆120Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- Ludus range for the Constructing Defense Lab☆72Updated 2 months ago