SwiftOnSecurity / PhishingRegex
Backup of my phishing regular expression testing bench
☆147Updated 7 years ago
Alternatives and similar repositories for PhishingRegex:
Users that are interested in PhishingRegex are comparing it to the libraries listed below
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆203Updated 7 years ago
- Exchange Transport rules to detect and enable response to phishing☆406Updated 4 years ago
- Open source solution to check prospective AD passwords against previously breached passwords☆52Updated 4 years ago
- ☆312Updated 5 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆216Updated 2 weeks ago
- PowerShell Module to interact with VirusTotal☆119Updated 5 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- PowerShell Module to interact with the Shodan service☆135Updated 9 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆115Updated 4 years ago
- Office365 Log Analysis Framework☆82Updated 5 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 4 years ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 4 months ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆207Updated 3 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated last year
- Security-Focused O365 Management and Log Scripts☆60Updated 2 years ago
- A batch script to demonstrate complex Microsoft Office deployments☆90Updated 6 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Powering Up Incident Response with Power-Response☆63Updated 4 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆211Updated 5 years ago
- Open source solution to check prospective AD passwords against previously breached passwords☆84Updated 6 years ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆599Updated 6 months ago
- PerchLabs threat feed☆16Updated 3 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆164Updated 6 years ago
- Sysmon configuration☆66Updated 6 years ago
- VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerfu…☆159Updated 7 years ago
- Powershell Threat Hunting Module☆282Updated 8 years ago
- A series of scripts☆98Updated 3 years ago
- Invoke-LiveResponse☆146Updated 2 years ago