JumpsecLabs / Guidance-AdviceLinks
Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries
☆13Updated 3 years ago
Alternatives and similar repositories for Guidance-Advice
Users that are interested in Guidance-Advice are comparing it to the libraries listed below
Sorting:
- Defensive-oriented Active Directory enumeration☆24Updated 9 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Various components we use in labs☆10Updated 4 years ago
- Scripts and One-Liners☆22Updated 4 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 2 months ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Azure AD Incident Response☆25Updated 3 years ago
- ☆33Updated 5 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- PowerShell Pass The Hash Utils☆16Updated 6 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Hashes of infamous malware☆26Updated last year
- scripts to setup environments for red/blue teams.☆16Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- ☆19Updated 4 years ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ☆21Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Updated 2 years ago