Permiso-io-tools / DetentionDodger
☆15Updated 3 months ago
Alternatives and similar repositories for DetentionDodger:
Users that are interested in DetentionDodger are comparing it to the libraries listed below
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Parser for Windows PowerShell script block logs☆13Updated 4 months ago
- ☆15Updated 3 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- self-hosted Azure OSINT tool☆30Updated 7 months ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- ☆16Updated last week
- ☆18Updated 6 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- ☆18Updated last year
- ☆19Updated last year
- A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support …☆11Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆25Updated this week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- Penguin OS Forensic (or Flight) Recorder☆40Updated 4 months ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated last month
- ☆28Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Nemesis agent for Mythic☆27Updated 8 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- External telegram feeder for AIL framework☆13Updated this week
- Ansible role that Installs Mythic☆15Updated 10 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 11 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆17Updated 3 months ago