DarwinSec / DEFCON-KQL-KUNG-FU-22
☆18Updated 2 years ago
Alternatives and similar repositories for DEFCON-KQL-KUNG-FU-22:
Users that are interested in DEFCON-KQL-KUNG-FU-22 are comparing it to the libraries listed below
- ☆23Updated 3 years ago
- ☆46Updated last month
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 4 months ago
- Kerberoast Detection Script☆30Updated 5 months ago
- Slides and materials for conference presentations☆11Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆20Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆41Updated last year
- ☆10Updated 8 months ago
- Living off the False Positive!☆35Updated 2 months ago
- Continuous kerberoast monitor☆44Updated last year
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testing☆38Updated 5 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- ☆10Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- ☆27Updated 3 years ago
- create a "simulated internet" cyber range environment☆16Updated 2 weeks ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago