H4NM / WhoYouCallingLinks
Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.
☆386Updated 2 months ago
Alternatives and similar repositories for WhoYouCalling
Users that are interested in WhoYouCalling are comparing it to the libraries listed below
Sorting:
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆316Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆259Updated 6 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆401Updated 2 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆543Updated 6 months ago
- Documentation and scripts to properly enable Windows event logs.☆618Updated last year
- Wireshark RDP resources☆213Updated 3 weeks ago
- LotL RMM☆208Updated last week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆237Updated 2 weeks ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆490Updated 2 weeks ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆747Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆310Updated last week
- ☆232Updated 2 weeks ago
- A GUI and CLI tool for removing bloat from executables☆406Updated 2 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆232Updated 9 months ago
- Retired TrustedSec Capabilities☆247Updated 7 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆184Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆171Updated 3 weeks ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆635Updated this week
- Python tool to check rootkits in Windows kernel☆197Updated 3 months ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,124Updated 3 weeks ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆361Updated 10 months ago
- ☆121Updated last year
- PowerShell Digital Forensics & Incident Response Scripts.☆625Updated 3 weeks ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆294Updated 10 months ago
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆935Updated last week
- ☆221Updated 2 weeks ago
- ☆201Updated 7 months ago
- An ADCS honeypot to catch attackers in your internal network.☆289Updated 11 months ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆400Updated 8 months ago