Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endpoints.
☆38Apr 5, 2024Updated last year
Alternatives and similar repositories for easy-wins-endpoint-defense
Users that are interested in easy-wins-endpoint-defense are comparing it to the libraries listed below
Sorting:
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- A list of resources to build a information security team.☆13Feb 10, 2021Updated 5 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- ☆33Feb 27, 2024Updated 2 years ago
- ☆16Aug 29, 2025Updated 6 months ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆488Nov 21, 2024Updated last year
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆28Sep 2, 2024Updated last year
- ☆25Dec 8, 2021Updated 4 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Oct 10, 2019Updated 6 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- TypeScript/JavaScript client libraries for Sliver☆24Updated this week
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.☆26Jun 24, 2023Updated 2 years ago
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Mar 2, 2026Updated last week
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆30Jun 18, 2025Updated 8 months ago
- ☆61Jun 24, 2023Updated 2 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated 2 months ago
- PowerShell scripts for running Magnet RESPONSE forensic collection tool in large enterprises.☆30Jan 9, 2025Updated last year
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- ☆66Sep 1, 2023Updated 2 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆82Feb 17, 2026Updated 2 weeks ago
- ☆46May 12, 2025Updated 9 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- ☆78Jan 15, 2026Updated last month
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆215May 23, 2020Updated 5 years ago
- Scan your account for the use of untrusted AMIs☆32Updated this week
- Incident Response Methodologies 2022☆1,106Apr 11, 2025Updated 10 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- GolenGMSA tool for working with GMSA passwords☆171Aug 21, 2025Updated 6 months ago
- A pySigma wrapper to manage detection rules.☆45Feb 17, 2026Updated 2 weeks ago