Scripts that cover the basics of interacting with the AMP for Endpoints API
☆17Feb 22, 2019Updated 7 years ago
Alternatives and similar repositories for amp-01-basics
Users that are interested in amp-01-basics are comparing it to the libraries listed below
Sorting:
- ☆32Jul 1, 2025Updated 8 months ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- Examples written over the span of several years, minimum requirement: PHP 7.1☆10Feb 13, 2026Updated 3 weeks ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- 📃 reMarkable 2 template for time block planning☆11Apr 5, 2022Updated 3 years ago
- dtmrepo is a mrepo replacement☆11Oct 11, 2024Updated last year
- On-demand scanning of websites for accessibility and security vulnerabilities/compliance / Analyse à la demande des sites Web pour les vu…☆12Apr 30, 2023Updated 2 years ago
- LogRhythm PowerShell Toolkit☆53Jan 2, 2026Updated 2 months ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Vars plugin for Ansible to retrieve AWS resource information☆12Apr 22, 2018Updated 7 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- Bulk turn on Analytic rules in Azure Sentinel☆19Oct 7, 2021Updated 4 years ago
- Automation examples for deploying VMware Appliance for Folding @ Home (https://flings.vmware.com/vmware-appliance-for-folding-home)☆15Apr 1, 2020Updated 5 years ago
- threshold☆13Mar 12, 2025Updated 11 months ago
- Chrome/Chromium Forensic Tool : Parses History, Visited Links, Downloaded Files and Cache☆20Feb 4, 2024Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- ☆16Jan 24, 2023Updated 3 years ago
- 300 lines eBPF tool that shows which pods are reading your K8s secrets and how often.☆68Updated this week
- ☆17Aug 24, 2020Updated 5 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Jul 4, 2017Updated 8 years ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- We are always looking for ways to leverage the Elastic Stack to add value to the Elastic and cybersecurity community.☆31Feb 10, 2024Updated 2 years ago
- Defender for Endpoint☆28Jul 12, 2024Updated last year
- Cisco eStreamer client☆24Aug 15, 2022Updated 3 years ago
- ☆27Jul 25, 2025Updated 7 months ago
- ☆29Aug 12, 2021Updated 4 years ago
- Notes on responding to security breaches relating to Azure AD☆121Mar 14, 2022Updated 3 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- Information for accessing The Cyber Plumber's Handbook Lab☆31Oct 10, 2022Updated 3 years ago
- ☆41Feb 20, 2025Updated last year
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- Forward Azure monitor logs to syslog (via Event Hub)☆35Sep 15, 2020Updated 5 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Conditional Access baseline for October 2025☆93Nov 26, 2025Updated 3 months ago