A Central Location For Everything You Need To Start Your Own Security Program In Your Organisation.
☆24Sep 22, 2019Updated 6 years ago
Alternatives and similar repositories for SecurityInABox
Users that are interested in SecurityInABox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security Assessment Data Management and Analysis Tool☆38May 6, 2021Updated 4 years ago
- Website repo☆11Sep 22, 2020Updated 5 years ago
- ☆17Mar 10, 2025Updated last year
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆46Apr 9, 2026Updated 3 weeks ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Azure☆91Jan 18, 2026Updated 3 months ago
- Functions for calling the Microsoft Graph API with PowerShell, for Azure AD Conditional Access Policies and Groups, as well as Endpoint M…☆12Jun 3, 2025Updated 11 months ago
- This solution presents a traditional 3-tier architecture in AWS.☆15May 1, 2023Updated 3 years ago
- Custom Teams app that uses OpenAI API and integration to PSA Tool☆14Dec 11, 2022Updated 3 years ago
- Packet communication investigator☆91Dec 8, 2022Updated 3 years ago
- Repo to track SANS BlueTeam Summit Presentation☆23Oct 4, 2022Updated 3 years ago
- asciidoc authored content for https://docs.prismacloud.io☆21Updated this week
- In this workshop, you will learn techniques to implement your Disaster Recovery strategies based on AWS multi-region approach. Questions?…☆25May 21, 2024Updated last year
- ☆21Apr 1, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Jun 18, 2024Updated last year
- Secure and log *available* activities in your Microsoft Office 365 environment☆40Aug 21, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Mausoleum of the Medusa source code - a Unity/C# game available on Steam for free☆12Mar 3, 2018Updated 8 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings