Truesec / Kaseya-CheckandMitigateLinks
This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mitigate further risk to a Kaseya monitored endpoint.
☆11Updated 3 years ago
Alternatives and similar repositories for Kaseya-CheckandMitigate
Users that are interested in Kaseya-CheckandMitigate are comparing it to the libraries listed below
Sorting:
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- ☆15Updated 3 years ago
- Official documentation for TheHive Project applications☆21Updated last year
- This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your …☆16Updated 4 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆29Updated 9 months ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- ☆42Updated last year
- Kerberoast Detection Script☆30Updated 7 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Follow all members of a list☆12Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- LDAP Querying without the Suck☆102Updated 6 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆20Updated 5 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- ☆34Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago