Create a SOC lab with SIEM, AD, Workstation, Firewall, Sysmon, IPS. Step by Step
☆30Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for -HOW-TO-Create_a_SOC_LAB
Users that are interested in -HOW-TO-Create_a_SOC_LAB are comparing it to the libraries listed below
Sorting:
- Automating Employee Onboarding with Power Automate☆14Jul 20, 2025Updated 7 months ago
- Scans NTFS permissions and ensures that BUILTIN\Administrators and NT AUTHORITY\SYSTEM have full control to every file and folder☆45Feb 8, 2025Updated last year
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Jan 1, 2022Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- ☆13Mar 28, 2024Updated last year
- ☆22Nov 22, 2025Updated 3 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Nov 15, 2023Updated 2 years ago
- Repository of open source malware here on Github!☆44Jan 11, 2022Updated 4 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- ☆34Feb 12, 2026Updated 2 weeks ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- inspect EntraID SCIM flows for troubleshooting☆30Nov 23, 2025Updated 3 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- This is an example of building a CI/CD pipeline using GitHub actions.☆11Feb 20, 2026Updated last week
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Gatsby theme scarlet is a personal portfolio which features 3 slides, several beautiful shades of purple, and our star Scarlet.☆12Updated this week
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- ☆14Feb 19, 2025Updated last year
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 4 months ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- The Scorebot Engine is a platform that allows scoring, host checking and other cool stuff☆10Nov 10, 2024Updated last year
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- a cat-like cli tool to showcase argument parsing☆12Nov 4, 2021Updated 4 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Mishky's AD Range & The Escalation Path from Hell☆16Jan 16, 2025Updated last year
- ☆17Jun 29, 2020Updated 5 years ago
- A python tool to parse and describe the SDDL string.☆17Jan 5, 2026Updated last month
- Repository for AsBuiltReport Microsoft DHCP module☆15Jan 31, 2026Updated last month
- Exchange Online Protection & Microsoft Defender For Office 365 Hardering Tool☆12Jan 14, 2023Updated 3 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Publicly available scripts☆19Nov 18, 2025Updated 3 months ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Framework for learning automotive embedded software architecture and cyber security☆14Sep 4, 2018Updated 7 years ago