YossiSassi / hAcKtive-Directory-ForensicsLinks
☆53Updated last month
Alternatives and similar repositories for hAcKtive-Directory-Forensics
Users that are interested in hAcKtive-Directory-Forensics are comparing it to the libraries listed below
Sorting:
- Full of public notes and Utilities☆117Updated 4 months ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆54Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 6 months ago
- ☆41Updated 2 years ago
- ☆47Updated 2 months ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆95Updated last year
- A PowerShell incident response script for quick triage☆80Updated 2 years ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆107Updated 6 months ago
- ☆72Updated 8 months ago
- Active Directory Purple Team Playbook☆108Updated 2 years ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆89Updated 10 months ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆31Updated last year
- PowerShell tool to triage systems☆12Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆58Updated 10 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- ESXi Cyber Security Incident Response Script☆23Updated 9 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last month
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆85Updated 4 months ago
- Simple PowerShell script to enable process scanning with Yara.☆94Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆93Updated 3 years ago
- ☆35Updated 8 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- ☆87Updated last year