NextSecurity / VSATLinks
Virtualization Security Audit Tool - Security assess CIS compliance of a Virtualization environments
☆12Updated last year
Alternatives and similar repositories for VSAT
Users that are interested in VSAT are comparing it to the libraries listed below
Sorting:
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆35Updated 3 years ago
- ☆11Updated 8 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆33Updated 10 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- ☆18Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 10 months ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Updated 2 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆13Updated 4 years ago
- ☆47Updated last month
- ☆25Updated 3 years ago
- ☆15Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- create a "simulated internet" cyber range environment☆16Updated last week
- ASR Configurator, Essentials and Atomic Testing☆42Updated last month
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- ESXi Cyber Security Incident Response Script☆22Updated 9 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆16Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 4 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Azure AD enumeration over MS Graph☆81Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago