CptOfEvilMinions / BlogProjectsLinks
Various blog post projects.
☆24Updated last week
Alternatives and similar repositories for BlogProjects
Users that are interested in BlogProjects are comparing it to the libraries listed below
Sorting:
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 5 years ago
- ☆70Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 4 years ago
- Kerberoast Detection Script☆30Updated 11 months ago
- Automatic detection engineering technical state compliance☆55Updated last year
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- ☆34Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- ☆19Updated 3 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆93Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- Look into EDR events from network☆24Updated 5 months ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 9 months ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 2 weeks ago
- ☆15Updated 6 years ago
- A tool to convert Windows evtx files (Windows Event Log Files) into JSON format and log to Splunk (optional) using HTTP Event Collector.☆58Updated 3 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 2 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆60Updated 4 years ago