RiverGumSecurity / CryptoJackLinks
☆22Updated 2 years ago
Alternatives and similar repositories for CryptoJack
Users that are interested in CryptoJack are comparing it to the libraries listed below
Sorting:
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 9 months ago
- Notes on responding to security breaches relating to Azure AD☆120Updated 3 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆152Updated last year
- A list of RMMs designed to be used in automation to build alerts☆117Updated 2 months ago
- Active Directory Purple Team Playbook☆115Updated 2 years ago
- Full of public notes and Utilities☆129Updated 11 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆144Updated 3 years ago
- Pushes Sysmon Configs☆90Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆272Updated 8 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Updated 2 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆156Updated last year
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆92Updated 5 years ago
- Audit program for AzureAD☆149Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆72Updated last month
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- PowerShell module for Office 365 and Azure log collection☆279Updated 3 months ago
- Active C&C Detector☆156Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated 2 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆93Updated 6 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated 2 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- ☆43Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated last year
- ☆124Updated last year
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- ☆105Updated 6 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated 2 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week