OWASP / www-project-cyber-defense-matrixView external linksLinks
Documentation on the Cyber Defense Matrix
☆24Apr 19, 2023Updated 2 years ago
Alternatives and similar repositories for www-project-cyber-defense-matrix
Users that are interested in www-project-cyber-defense-matrix are comparing it to the libraries listed below
Sorting:
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- Powershell script to generate DMARC reports. Script pulls data from the mailbox and parses this into a onpremises GEO enabled HTML report…☆28Feb 7, 2022Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- Containerization by IBM for SAP S/4HANA with Red Hat OpenShift☆13Sep 17, 2025Updated 5 months ago
- Labs and course material for Advania course 'PowerShell Advanced Fundamentals'☆11Jan 12, 2026Updated last month
- ☆43Apr 18, 2023Updated 2 years ago
- Review and audit all shares☆13Feb 10, 2026Updated last week
- ☆16Oct 31, 2025Updated 3 months ago
- Plugin for Joplin, the note-taking software. Makes all the possible links in a note.☆12Dec 25, 2023Updated 2 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- This package allows reading and writing bettercap's session recordings.☆14Apr 8, 2019Updated 6 years ago
- Set Lenovo BIOS settings through Intune and PowerShell☆14Oct 30, 2021Updated 4 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- Cyber Security Resources☆10Jan 25, 2024Updated 2 years ago
- ☆14Feb 9, 2026Updated last week
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- code examples, tutos and tips to code with a Poppy Humanoid robot or any Poppy creature.☆10Apr 18, 2016Updated 9 years ago
- Deprecated SMS 2FA-authentication for Redmine. Please use https://github.com/southbridgeio/redmine_2fa☆11Nov 19, 2019Updated 6 years ago
- A static code analyzer to generate network connection topology for micro-service applications☆18Feb 3, 2026Updated 2 weeks ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Huntress API☆11May 26, 2022Updated 3 years ago
- Lot of gnuwin32 tools with aliases in PowerShell☆11Aug 20, 2015Updated 10 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 7 months ago
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12May 20, 2025Updated 8 months ago
- Code for the USB write blocker built on the FTDI VNC2 development board☆10Aug 17, 2021Updated 4 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- ☆11Jun 29, 2022Updated 3 years ago
- Nextcloud command-line client☆11Jan 27, 2026Updated 3 weeks ago
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 2 months ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated 11 months ago
- Archive for data from mcbroken.com.☆13Updated this week
- Website for breaches.net☆10Nov 9, 2022Updated 3 years ago
- Nagios Plug-in for iLO RESTful Extension☆12Aug 12, 2016Updated 9 years ago