RiverGumSecurity / CryptoJackLinks
☆21Updated 2 years ago
Alternatives and similar repositories for CryptoJack
Users that are interested in CryptoJack are comparing it to the libraries listed below
Sorting:
- Full of public notes and Utilities☆127Updated 8 months ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆151Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 7 months ago
- Active Directory Purple Team Playbook☆113Updated 2 years ago
- Active C&C Detector☆156Updated 2 years ago
- Notes on responding to security breaches relating to Azure AD☆117Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆140Updated 2 years ago
- A list of RMMs designed to be used in automation to build alerts☆113Updated 6 months ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆92Updated 4 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- ☆103Updated 3 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Updated 3 years ago
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- ☆42Updated last year
- Public Repo for Atomic Test Harness☆279Updated 6 months ago
- ☆80Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆265Updated 5 months ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆93Updated 4 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆121Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆69Updated 3 weeks ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 2 weeks ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆315Updated 2 weeks ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- Some Threat Hunting queries useful for blue teamers☆129Updated 3 years ago