NextronSystems / aurora-agent-manualLinks
Aurora Agent User Manual
☆30Updated 2 months ago
Alternatives and similar repositories for aurora-agent-manual
Users that are interested in aurora-agent-manual are comparing it to the libraries listed below
Sorting:
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 6 months ago
- DEFCON 31 slide deck and video link☆64Updated last month
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆42Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated 2 weeks ago
- General Content☆26Updated last year
- Baseline a Windows System against LOLBAS☆27Updated last year
- VirtualGHOST Detection Tool☆91Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- ☆18Updated 3 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- create a "simulated internet" cyber range environment☆17Updated last month
- This is a tool box for CIS Windows Hardening☆8Updated 10 months ago
- LOKI2 - Simple IOC and YARA Scanner☆97Updated 3 weeks ago
- Guide journalisation Microsoft☆70Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 7 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆114Updated 11 months ago
- Canary Detection☆183Updated 2 months ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- ASR Configurator, Essentials and Atomic Testing☆71Updated 3 months ago
- THOR APT Scanner User Manual☆18Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- Windows notifier tool that detects suspicious connections by monitoring ETW event logs☆121Updated 2 years ago
- Living off the False Positive!☆37Updated 5 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆113Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 3 weeks ago
- Qemuno Framework☆24Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆127Updated 5 months ago