Securityinbits / cheatsheet
These are some of the commands which I use frequently during Malware Analysis and DFIR.
☆25Updated 8 months ago
Related projects: ⓘ
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- ☆42Updated 3 months ago
- ☆10Updated 3 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- ☆21Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated 7 months ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated last year
- A CALDERA plugin for autonomous incident response☆23Updated 7 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 5 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- Jupyter notebooks☆22Updated 4 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆15Updated last year
- Azure AD Incident Response☆24Updated 2 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- Bloodhound Portable for Windows☆51Updated last year
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 2 years ago
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- Threat Mitigation Strategies☆23Updated last year
- Powershell / C# based cross platform forensic framework based for live incident response☆21Updated 4 years ago
- ☆40Updated 5 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- General Content☆19Updated 2 months ago
- ☆10Updated 3 years ago