FirmGuardian / backdoors-and-breaches-pcioView external linksLinks
A port of BHIS's Backdoors & Breaches for playingcards.io
☆64Jan 26, 2023Updated 3 years ago
Alternatives and similar repositories for backdoors-and-breaches-pcio
Users that are interested in backdoors-and-breaches-pcio are comparing it to the libraries listed below
Sorting:
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Oct 17, 2024Updated last year
- ☆73Mar 5, 2023Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- ☆14Feb 10, 2021Updated 5 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,274Nov 15, 2025Updated 3 months ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- links collected from SOC Core Skills class☆85Dec 17, 2020Updated 5 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆27Nov 30, 2025Updated 2 months ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- ☆72Feb 4, 2026Updated last week
- Allows simplified Python interaction with Rapid7's InsightIDR REST API.☆25Apr 16, 2024Updated last year
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- Useful scripts for autokey☆29Oct 28, 2020Updated 5 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Feb 9, 2026Updated last week
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- A Go client for crobat☆24Mar 12, 2020Updated 5 years ago
- ☆56Jun 12, 2021Updated 4 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,431Dec 27, 2022Updated 3 years ago
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆32Feb 4, 2026Updated last week
- ☆30Nov 15, 2018Updated 7 years ago
- ☆83Mar 1, 2024Updated last year
- ☆81Jun 17, 2024Updated last year
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- ☆33Dec 4, 2022Updated 3 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- Atomic Purple Team Framework and Lifecycle☆300Feb 11, 2021Updated 5 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Apr 9, 2022Updated 3 years ago
- ☆14Feb 6, 2026Updated last week
- sideloading PoC using onedrive.exe & version.dll☆91Oct 30, 2025Updated 3 months ago
- ☆77Jun 25, 2019Updated 6 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆148Feb 1, 2026Updated 2 weeks ago