CIS Benchmark testing of Windows SIEM configuration
☆45May 25, 2023Updated 2 years ago
Alternatives and similar repositories for auditpolCIS
Users that are interested in auditpolCIS are comparing it to the libraries listed below
Sorting:
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- ☆36Apr 24, 2024Updated last year
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆270Sep 26, 2023Updated 2 years ago
- ☆84Nov 21, 2024Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆112Dec 11, 2023Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- ☆12Dec 15, 2024Updated last year
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆107Apr 14, 2023Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57May 1, 2023Updated 2 years ago
- Linux Security and Monitoring Scripts☆328Sep 27, 2025Updated 5 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Apr 4, 2024Updated last year
- Click Once + App Domain☆64Feb 23, 2026Updated last week
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆181Feb 27, 2024Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- A Web Vulnerability Scanner and Patcher☆170Feb 14, 2026Updated 2 weeks ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 9 months ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Aug 26, 2020Updated 5 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆12Aug 10, 2022Updated 3 years ago