DarwinSec / DEFCON-KQL-KUNG-FU-22
☆18Updated 2 years ago
Alternatives and similar repositories for DEFCON-KQL-KUNG-FU-22:
Users that are interested in DEFCON-KQL-KUNG-FU-22 are comparing it to the libraries listed below
- ☆47Updated 3 weeks ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ☆24Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Kerberoast Detection Script☆30Updated 6 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Slides and materials for conference presentations☆11Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- ☆20Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 4 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- ☆16Updated 2 years ago
- ☆41Updated last year
- A Golang CLI for the MITRE ATT&CK Framework☆11Updated last week
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆69Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- General scripts that gather information out of Active Directory☆16Updated 2 years ago
- ☆41Updated 3 years ago
- A not-curated list of cloud hacking labs☆25Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year