Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity
☆95Feb 2, 2022Updated 4 years ago
Alternatives and similar repositories for Set-AuditRule
Users that are interested in Set-AuditRule are comparing it to the libraries listed below
Sorting:
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Nov 25, 2019Updated 6 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Building environments to replicate small networks and deploy applications☆330Jan 9, 2026Updated last month
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 2 months ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Nov 1, 2019Updated 6 years ago
- [Fork] PowerSploit - A PowerShell Post-Exploitation Framework☆23Dec 27, 2022Updated 3 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- A repository for using windows event forwarding for incident detection and response☆1,296Sep 8, 2025Updated 5 months ago
- BloodHound with a twist of cloud☆82Jul 28, 2020Updated 5 years ago
- Evade sysmon and windows event logging☆625Apr 8, 2020Updated 5 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 2 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Dec 20, 2019Updated 6 years ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆755Nov 18, 2021Updated 4 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month