NCSC-NL / citrix-2025Links
☆52Updated 3 months ago
Alternatives and similar repositories for citrix-2025
Users that are interested in citrix-2025 are comparing it to the libraries listed below
Sorting:
- ☆28Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 6 months ago
- DEFCON 31 slide deck and video link☆66Updated 6 months ago
- ☆74Updated last week
- Your Browser-based EVTX Companion☆89Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 5 months ago
- Examine Chrome extensions for security issues☆88Updated 3 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆140Updated 3 weeks ago
- Slides of my public talks☆56Updated 2 years ago
- ☆53Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 7 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆100Updated 10 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 9 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 3 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated last month
- ASR Configurator, Essentials and Atomic Testing☆99Updated 7 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Updated 2 years ago
- Ludus range for the Constructing Defense Lab☆67Updated last month
- VirtualGHOST Detection Tool☆100Updated last week
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆127Updated 3 months ago
- A list of RMMs designed to be used in automation to build alerts☆116Updated last month
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆113Updated 3 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆153Updated 2 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago