DefensiveOrigins / ps-whitenoiseweb
Powershell - web traffic whitenoise generator
☆46Updated 4 years ago
Alternatives and similar repositories for ps-whitenoiseweb:
Users that are interested in ps-whitenoiseweb are comparing it to the libraries listed below
- All my slides for any talks☆23Updated 3 months ago
- The PoLRBear Project☆35Updated 3 years ago
- Purple Team Security☆74Updated 2 years ago
- Public Landing Page☆16Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- ☆32Updated last year
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- ☆39Updated 5 years ago
- ☆77Updated 5 years ago
- Defensive Origins Training Schedule☆37Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 6 years ago
- ☆41Updated 4 years ago
- ☆9Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- Splunk TA for alert action to TheHive-project☆11Updated 4 years ago
- Powering Up Incident Response with Power-Response☆63Updated 4 years ago
- ☆28Updated 4 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- ☆54Updated 3 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 6 years ago
- Office365 Log Analysis Framework☆81Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago
- ☆20Updated 5 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago