CiscoCXSecurity / unix-auditLinks
Framework for generating audit commands for Unix security audits
☆66Updated last year
Alternatives and similar repositories for unix-audit
Users that are interested in unix-audit are comparing it to the libraries listed below
Sorting:
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 9 months ago
- Linux #rootkit and #malware revealer☆26Updated 10 months ago
- ☆20Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Some Cheat Sheet for Red Team☆16Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- ☆37Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 2 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 11 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 8 months ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Qemuno Framework☆24Updated 2 years ago
- ☆32Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- Folder Or File Delete to Get System Shell on Current Session Desktop☆39Updated 5 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆19Updated 5 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- create a "simulated internet" cyber range environment☆17Updated last month
- ☆18Updated last year
- ☆54Updated 6 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago