AlbinoGazelle / esxi-testing-toolkitView external linksLinks
🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.
☆82Apr 20, 2025Updated 9 months ago
Alternatives and similar repositories for esxi-testing-toolkit
Users that are interested in esxi-testing-toolkit are comparing it to the libraries listed below
Sorting:
- An introduction to detection engineering☆13Jan 3, 2025Updated last year
- Utilities for Pentesting with BloodHound☆22Dec 10, 2025Updated 2 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆21Jan 5, 2025Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Mar 27, 2025Updated 10 months ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆22Jun 9, 2019Updated 6 years ago
- This repo is about Active Directory Advanced Threat Hunting☆649Feb 17, 2025Updated 11 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆128Jan 27, 2026Updated 2 weeks ago
- Intune configuration files for MacOS Sonoma hardening☆31Dec 6, 2023Updated 2 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆12Oct 16, 2025Updated 4 months ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆354Jan 8, 2026Updated last month
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆622Dec 20, 2024Updated last year
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆109Aug 26, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆824Feb 5, 2026Updated last week
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 8 months ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 9 months ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Nov 9, 2022Updated 3 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆421Aug 10, 2025Updated 6 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆255Jan 29, 2026Updated 2 weeks ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆457Oct 29, 2025Updated 3 months ago
- ☆75Jan 1, 2026Updated last month
- ☆14Jul 21, 2024Updated last year
- A repository to store community malware research notes and findings.☆15Dec 23, 2025Updated last month
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆60Feb 5, 2026Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year