WiredPulse / PoSh-R2Links
PowerShell - Rapid Response... For the incident responder in you!
☆303Updated 6 years ago
Alternatives and similar repositories for PoSh-R2
Users that are interested in PoSh-R2 are comparing it to the libraries listed below
Sorting:
- Powershell Threat Hunting Module☆287Updated 9 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆660Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆324Updated 6 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆200Updated 8 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆214Updated 4 years ago
- Sysmon Tools for PowerShell☆231Updated 7 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆489Updated 8 years ago
- PowerShell Module to interact with VirusTotal☆122Updated 5 years ago
- EventList☆378Updated 4 years ago
- Credential and Red Teaming Defense for Windows Environments☆328Updated last year
- Simulates common user behaviour on local and remote Windows hosts.☆281Updated 7 years ago
- ☆318Updated 5 years ago
- ☆280Updated 2 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆227Updated 10 months ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Updated 2 years ago
- ☆200Updated 4 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆228Updated last month
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 7 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆206Updated 4 years ago
- PowerShell Module with Security cmdlets for security work☆449Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆205Updated last year
- Office365 Log Analysis Framework☆81Updated 6 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 9 years ago
- ☆263Updated last month
- Some PowerShell Stuff☆281Updated 3 years ago
- Parser for Windows PowerShell script block logs☆100Updated last year
- An IOC framework written in PowerShell☆19Updated 8 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 6 years ago