HCRitter / HARpwn
HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitization of HARTokens from HTTP Archive (HAR) files. Simplify the process of retrieving valuable data and ensure your HAR files are safe and secure with HARpwn, where HARTokens meet 'pwnage' with a touch of humor.
☆19Updated last year
Related projects ⓘ
Alternatives and complementary repositories for HARpwn
- MS Graph Commands and Tools for Blue Teamers☆48Updated last year
- ☆40Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆25Updated last year
- ☆27Updated last year
- Reportly is an AzureAD user activity report tool.☆89Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆43Updated last year
- ☆21Updated 5 months ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆14Updated 10 months ago
- 🏴☠️ BST is an ever-evolving collection of 🛠 tools to help in security and administration tasks 😉☆12Updated this week
- Powershell Script to enumerate AzureAD and output good data☆14Updated last year
- ResearchDev - XDR & SIEM Detection☆62Updated this week
- PowerShell script to create reports of M365 User Multi-factor Authentication Registration Status and Highlight MFA Related Conditional Ac…☆12Updated 6 months ago
- ☆40Updated last year
- ☆35Updated 2 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆38Updated 2 weeks ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆44Updated 3 months ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆23Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆30Updated 6 months ago
- ☆10Updated 3 months ago
- ECC Public Key Cryptography☆36Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 3 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 5 months ago
- Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.☆75Updated 3 months ago
- Fun GUI for Group3rs output log☆26Updated last year
- ☆47Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆12Updated 4 months ago
- ☆105Updated last year