Public tools, scripts or code snippets that can help when working with our products
☆46Feb 11, 2026Updated 2 weeks ago
Alternatives and similar repositories for nextron-helper-scripts
Users that are interested in nextron-helper-scripts are comparing it to the libraries listed below
Sorting:
- ☆17Oct 13, 2025Updated 4 months ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- THOR Thunderstorm Collectors☆25Updated this week
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- ☆14Nov 30, 2022Updated 3 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Sep 24, 2023Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated last month
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆24Updated this week
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- ☆17Jan 22, 2026Updated last month
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- ☆37Sep 30, 2021Updated 4 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 5 months ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 8 months ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Slides of my public talks☆62Feb 20, 2026Updated last week
- This Library provides python bindings to interact with the Cylance API.☆20Mar 20, 2023Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- ☆27May 6, 2024Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆147Dec 21, 2025Updated 2 months ago