Distribution of the SANS SEC504 Windows Cheat Sheet Lab
☆82May 25, 2020Updated 5 years ago
Alternatives and similar repositories for 504lab
Users that are interested in 504lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create Password lists for cracking lyrical passwords☆18May 11, 2024Updated last year
- ☆39Dec 10, 2020Updated 5 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆103Jun 2, 2021Updated 4 years ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆227Nov 9, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- SANS Blue Team Pages☆13Apr 8, 2017Updated 9 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- ☆21Apr 16, 2023Updated 3 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Oct 11, 2020Updated 5 years ago
- Wrap any binary into a cached webserver☆61Apr 5, 2022Updated 4 years ago
- Simple parser to get useful information from AWS S3 logs☆28Sep 5, 2021Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆462Feb 4, 2022Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 3 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Jul 1, 2022Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Tools for simulating threats☆203Oct 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A shell script to generate Linux Server's health report in HTML☆12Mar 8, 2017Updated 9 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆129Jan 31, 2022Updated 4 years ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- A collaborative CISSP notes card☆40Dec 20, 2015Updated 10 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- ☆2,403Oct 14, 2023Updated 2 years ago
- Resources, tools and utilities about Threat Intelligence☆91Mar 18, 2023Updated 3 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Apr 9, 2022Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- Parses for Google Analytic values in raw files like RAM, DD images etc.☆18Apr 17, 2016Updated 10 years ago
- My Jupyter Notebooks☆37Mar 14, 2025Updated last year
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆46Mar 13, 2025Updated last year
- ☆30Nov 15, 2018Updated 7 years ago