DarwinSec / DEFCON-KQL-KUNG-FU-22Links
☆18Updated 3 years ago
Alternatives and similar repositories for DEFCON-KQL-KUNG-FU-22
Users that are interested in DEFCON-KQL-KUNG-FU-22 are comparing it to the libraries listed below
Sorting:
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- ☆25Updated 3 years ago
- ☆47Updated 3 weeks ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- ☆76Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆28Updated 7 months ago
- ☆19Updated 3 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆33Updated last year
- A not-curated list of cloud hacking labs☆27Updated last year
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆29Updated last year
- Kerberoast Detection Script☆30Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ☆18Updated last year
- ☆60Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- ☆44Updated 4 months ago
- Living off the False Positive!☆40Updated 9 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 3 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 4 months ago
- ☆70Updated 2 years ago
- ☆34Updated 4 years ago
- General Content☆26Updated last year
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago