Truvis / Yealink
Cheatsheets and other Yealink Phone information.
☆16Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Yealink
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 4 years ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆74Updated 3 years ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- Incident Response Network Tools☆23Updated 3 years ago
- Leverage Sophos Central API☆25Updated last year
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆11Updated last year
- Security-Focused O365 Management and Log Scripts☆60Updated 2 years ago
- Collection of Dashboards for Threat Hunting and more!☆58Updated 4 years ago
- ☆13Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 6 years ago
- Script to show info on AD computers, and show what switch ports they are plugged into☆20Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- A set of programs to download, upload, convert, analyze and create a policy for FortiGate firewalls☆13Updated last year
- Palo Alto powershell☆39Updated 2 years ago
- Meraki Powershell Module☆35Updated 2 years ago
- Tools to create a Native Windows Audit Collection Platform. Active Directory example provided☆77Updated 5 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆38Updated 4 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- A collection of scripts useful in management of Splunk deployment☆20Updated 2 months ago
- AdmPwd.E client and support tools☆31Updated 4 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆37Updated 6 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆48Updated 3 months ago
- Windows and macOS Hardening Interface to make security more accessible.☆38Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- Tony's collection of powershell scripts, typically geared toward cybersec☆32Updated last month
- Convert snort IPS signatures to FortiGate custom IPS signature syntax.☆36Updated last year
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- Cisco AMP threat hunting scripts☆14Updated 2 weeks ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆50Updated 3 years ago
- ☆17Updated 2 years ago