MHaggis / SDDLMakerView external linksLinks
The home of the SDDLMaker
☆28Jan 13, 2025Updated last year
Alternatives and similar repositories for SDDLMaker
Users that are interested in SDDLMaker are comparing it to the libraries listed below
Sorting:
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated last year
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Repository for Ludus french templates☆21Jan 17, 2026Updated 3 weeks ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 7 months ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- AppLocker Policy Generator☆25Aug 25, 2025Updated 5 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Mar 11, 2025Updated 11 months ago
- ☆44Updated this week
- VirtualBox Web Control Panel is a lightweight HTTP server script providing a simple web interface to list, control, and interact with Vir…☆25Apr 15, 2025Updated 9 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆197Nov 25, 2025Updated 2 months ago
- WER Server☆19Feb 26, 2017Updated 8 years ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆63Jan 12, 2026Updated last month
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- ☆139Sep 9, 2025Updated 5 months ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆136Sep 28, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- ACL Viewer for Windows☆132May 4, 2025Updated 9 months ago
- cbReader - A simple web-based comic book reader (CBZ/CBR)☆10May 21, 2018Updated 7 years ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆34Apr 12, 2024Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆56Apr 4, 2024Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆38Sep 12, 2024Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Oct 4, 2024Updated last year
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆58Aug 8, 2025Updated 6 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆261Apr 14, 2025Updated 9 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Nov 17, 2024Updated last year
- ☆41Sep 9, 2023Updated 2 years ago
- ☆36Nov 11, 2025Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆46Sep 18, 2025Updated 4 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆91Nov 3, 2025Updated 3 months ago
- Active Directory delegation management tool☆438Oct 25, 2025Updated 3 months ago