Antonlovesdnb / SysmonConfigPusher2Links
Sysmon Config Pusher - Modernized
☆31Updated 3 weeks ago
Alternatives and similar repositories for SysmonConfigPusher2
Users that are interested in SysmonConfigPusher2 are comparing it to the libraries listed below
Sorting:
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆116Updated 5 months ago
- Scripts to enumerate and report on Entra Conditional Access☆41Updated 4 months ago
- Kerberoast Detection Script☆31Updated last year
- General Content☆25Updated last month
- This script validates the most common Conditional Access policies in Microsoft 365.☆10Updated last year
- Fun GUI for Group3rs output log☆37Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Updated 3 years ago
- ☆100Updated 5 months ago
- ☆86Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Updated 3 weeks ago
- ☆26Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Slides of my public talks☆56Updated 2 years ago
- Default Detections for EDR☆97Updated last year
- Pushes Sysmon Configs☆90Updated 4 years ago
- SQL, IIS, Oh My...☆22Updated 11 months ago
- ☆50Updated last week
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- ☆11Updated 3 years ago
- ☆107Updated 3 years ago
- My Notes from Hugging Face AI Agents Course☆19Updated 11 months ago
- ☆43Updated 4 years ago
- Presentations from Conferences☆30Updated last year
- Velociraptor Server hosted in Azure App Service☆59Updated 7 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 3 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- blame Huy☆42Updated 5 years ago
- ☆21Updated 4 months ago