This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
☆52Sep 14, 2025Updated 7 months ago
Alternatives and similar repositories for BTPS-SecPack
Users that are interested in BTPS-SecPack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Mar 22, 2026Updated last month
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆16Jun 3, 2022Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Mar 21, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Secure and log *available* activities in your Microsoft Office 365 environment☆40Aug 21, 2018Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A PowerShell implementation of Claude Code: agent loop + tools + permissions.☆79Feb 7, 2026Updated 2 months ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- Provides various Windows Server Active Directory (AD) security-focused reports.☆109Jan 21, 2026Updated 3 months ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 5 years ago
- A PowerShell module to deploy active directory decoy objects.☆240Nov 17, 2019Updated 6 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- ☆26May 25, 2023Updated 2 years ago
- EWS Editor for Dynamics 365☆10Nov 7, 2019Updated 6 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerShell cmdlets you may find useful☆14Jan 8, 2025Updated last year
- An IP list of bad actors targeting public infra like website, ssh endpoints, etc.☆21Mar 31, 2026Updated last month
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Perform OSINT on external targets using Shodan☆24Feb 7, 2024Updated 2 years ago
- Here are all of the PowerPoint presentations that I have ever created and presented.☆12Dec 28, 2020Updated 5 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆484Nov 15, 2024Updated last year
- ☆14Sep 8, 2022Updated 3 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 20, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Jan 23, 2023Updated 3 years ago
- Força bruta em formulários web.☆19Feb 8, 2015Updated 11 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- A repo for documents containing curated list of health and (in the future security) checks to be run against a Windows Active-Directory d…☆169Jul 29, 2019Updated 6 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago