airbus-seclab / bta
Open source Active Directory security audit framework.
☆134Updated 7 years ago
Alternatives and similar repositories for bta:
Users that are interested in bta are comparing it to the libraries listed below
- Active Directory permissions (ACL/ACE) auditing tools☆148Updated 7 years ago
- Smb Scanner from PingCastle☆124Updated 6 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Updated 6 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆170Updated 2 months ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆142Updated 5 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 6 years ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 7 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Active Directory enumeration from non-domain system.☆118Updated 8 years ago
- Sysmon configuration☆65Updated 6 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- Repository for my ATT&CK analysis research.☆69Updated 5 years ago
- A powershell script for creating a Windows honeyport.☆89Updated last month
- Some security related PowerShell scripts I developed.☆79Updated 6 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 6 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- PowerShell to Slack C2☆109Updated 6 years ago