CIS Benchmark testing of Windows SIEM configuration
☆45May 25, 2023Updated 2 years ago
Alternatives and similar repositories for auditpolCIS
Users that are interested in auditpolCIS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Mar 20, 2026Updated last month
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆270Sep 26, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- ☆84Nov 21, 2024Updated last year
- ☆36Apr 24, 2024Updated 2 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆114Mar 31, 2026Updated last month
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆56May 1, 2023Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆107Apr 14, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆100Jan 13, 2026Updated 3 months ago
- Terraform playbook of a vulnerable Azure deployment☆11Apr 28, 2022Updated 4 years ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆53Feb 22, 2024Updated 2 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- ☆13Dec 15, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆61Feb 4, 2025Updated last year
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated 11 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 5 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Jan 24, 2023Updated 3 years ago
- Click Once + App Domain☆67Feb 23, 2026Updated 2 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆30Apr 3, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- ☆94May 14, 2022Updated 3 years ago
- ☆50Jun 4, 2025Updated 11 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆188Feb 27, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- A Web Vulnerability Scanner and Patcher☆172Feb 14, 2026Updated 2 months ago