LMGsec / Magic-Unicorn-ToolLinks
☆261Updated 6 years ago
Alternatives and similar repositories for Magic-Unicorn-Tool
Users that are interested in Magic-Unicorn-Tool are comparing it to the libraries listed below
Sorting:
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆739Updated 6 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆203Updated 7 years ago
- A batch script to demonstrate complex Microsoft Office deployments☆92Updated 7 years ago
- Backup of my phishing regular expression testing bench☆149Updated 8 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- PowerShell - Rapid Response... For the incident responder in you!☆299Updated 5 years ago
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆486Updated 7 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆165Updated 6 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆217Updated 2 months ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 5 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated 2 years ago
- EventList☆376Updated 4 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆653Updated 5 years ago
- Main Build directory☆179Updated 6 years ago
- Query and report user logons relations from MS Windows Security Events☆243Updated 6 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago
- ☆314Updated 5 years ago
- Some PowerShell Defensive Scripts☆127Updated 8 years ago
- Scripts and code referenced in CrowdStrike blog posts☆331Updated 5 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆576Updated 6 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆337Updated 2 years ago
- Windows Live Artifacts Acquisition Script☆188Updated 2 years ago
- ☆73Updated 7 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Scripts for interacting with MSRC portal data☆77Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago