A port of BHIS's Backdoors & Breaches for playingcards.io
☆64Jan 26, 2023Updated 3 years ago
Alternatives and similar repositories for backdoors-and-breaches-pcio
Users that are interested in backdoors-and-breaches-pcio are comparing it to the libraries listed below
Sorting:
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Oct 17, 2024Updated last year
- ☆73Mar 5, 2023Updated 3 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Bloodhound Reporting for Blue and Purple Teams☆1,278Nov 15, 2025Updated 3 months ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- links collected from SOC Core Skills class☆85Dec 17, 2020Updated 5 years ago
- Allows simplified Python interaction with Rapid7's InsightIDR REST API.☆25Apr 16, 2024Updated last year
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆28Nov 30, 2025Updated 3 months ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆299Feb 9, 2026Updated last month
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- ☆78Feb 4, 2026Updated last month
- ☆56Jun 12, 2021Updated 4 years ago
- A Go client for crobat☆24Mar 12, 2020Updated 5 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Dec 27, 2022Updated 3 years ago
- A Simple Ransomware Vaccine☆974Nov 8, 2023Updated 2 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 8 months ago
- ☆84Mar 1, 2024Updated 2 years ago
- ☆83Jun 17, 2024Updated last year
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- ☆33Dec 4, 2022Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- Atomic Purple Team Framework and Lifecycle☆300Feb 11, 2021Updated 5 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- ☆14Feb 6, 2026Updated last month
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Apr 9, 2022Updated 3 years ago
- sideloading PoC using onedrive.exe & version.dll☆92Oct 30, 2025Updated 4 months ago
- Automation around Entra ID☆38Jul 21, 2025Updated 7 months ago
- ☆39Feb 12, 2020Updated 6 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago