The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365
☆180Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for PIE
Users that are interested in PIE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- LogRhythm PowerShell Toolkit☆53Jan 2, 2026Updated 2 months ago
- Includes a smorgasbord of LogRhythm related utilities and scripts that are all 100% unofficial and should never be used by anyone, ever.☆20Apr 12, 2018Updated 7 years ago
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- OC Admin (Formerly EZ-Cloud) - the Open Collector Admin and On-Boarder for Core SIEM☆12Jan 13, 2026Updated 2 months ago
- Backup of my phishing regular expression testing bench☆151Mar 20, 2017Updated 9 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆494Jul 29, 2017Updated 8 years ago
- Exchange Transport rules to detect and enable response to phishing☆414May 9, 2020Updated 5 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- ☆262Jul 6, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆844Jun 25, 2024Updated last year
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆480Nov 15, 2024Updated last year
- Automated Use Case Testing☆171May 1, 2018Updated 7 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- PowerShell Obfuscation Detection Framework☆751Dec 1, 2023Updated 2 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- Fast Advanced Spam Analysis Tool☆307Aug 6, 2025Updated 7 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Nov 17, 2020Updated 5 years ago