WiredPulse / PoSh-R2
PowerShell - Rapid Response... For the incident responder in you!
☆297Updated 5 years ago
Alternatives and similar repositories for PoSh-R2:
Users that are interested in PoSh-R2 are comparing it to the libraries listed below
- Powershell Threat Hunting Module☆282Updated 8 years ago
- Currently not updated for WMIEvent module...☆262Updated 8 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆650Updated 5 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆203Updated 7 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆207Updated 3 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆211Updated 5 years ago
- Automated, Collection, and Enrichment Platform☆324Updated 5 years ago
- ☆312Updated 5 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆216Updated 2 weeks ago
- Sysmon Tools for PowerShell☆229Updated 6 years ago
- Credential and Red Teaming Defense for Windows Environments☆324Updated 7 months ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆484Updated 7 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆740Updated 6 years ago
- ☆275Updated last year
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆198Updated 8 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated last year
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆164Updated 6 years ago
- VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerfu…☆159Updated 7 years ago
- Some PowerShell Stuff☆282Updated 2 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆444Updated 3 months ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 6 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 4 years ago
- PowerShell Module to interact with VirusTotal☆119Updated 5 years ago
- ☆197Updated 3 years ago
- EventList☆372Updated 3 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆197Updated 6 years ago
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Updated 2 years ago
- PowerShell Module with Security cmdlets for security work☆439Updated 4 years ago