☆13Feb 18, 2024Updated 2 years ago
Alternatives and similar repositories for building-detections-azure
Users that are interested in building-detections-azure are comparing it to the libraries listed below
Sorting:
- ☆15May 9, 2023Updated 2 years ago
- Serverless AWS application to upload and hash evidence files.☆23Oct 26, 2022Updated 3 years ago
- This repository contains various public projects created by the owners of Hybrid Brothers☆21Nov 3, 2023Updated 2 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- Forensic Artifact Collection Tool Matrix☆95Nov 9, 2024Updated last year
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- ☆30Feb 28, 2026Updated last week
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- 5000 Auto YouTube Comments For Video & Shorts Using Selenium with Python on Localhost☆15Nov 16, 2025Updated 3 months ago
- ☆10Mar 31, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- SafeType™ anonymizes sensitive data typed into ChatGPT to avoid misuse and accidental disclosures☆18Feb 14, 2024Updated 2 years ago
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Mar 3, 2026Updated last week
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆18Jun 21, 2024Updated last year
- ☆11May 2, 2022Updated 3 years ago
- Welcome to the Just another Kusto hacker ("JAKH") contest!☆54Jun 6, 2025Updated 9 months ago
- ☆14Mar 5, 2021Updated 5 years ago
- ☆11Aug 23, 2021Updated 4 years ago
- ☆13Jun 15, 2024Updated last year
- Summarize CTI reports with OpenAI☆18Mar 2, 2026Updated last week
- Python library for easy handling of disk-images☆12Feb 11, 2026Updated 3 weeks ago
- An automation framework for deploying Microsoft Sentinel environments using pipelines. This project combines infrastructure-as-code (Bice…☆22Jul 31, 2025Updated 7 months ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- ☆15Mar 12, 2025Updated 11 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Tools and scripts that are useful with the Microsoft Entra ID, M365, and Azure cloud☆15Aug 29, 2025Updated 6 months ago
- ☆12May 19, 2025Updated 9 months ago
- GraphViz dot files into Figma☆14Oct 24, 2025Updated 4 months ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- IP address filter by City☆12Jan 17, 2025Updated last year
- Chat4GPT Experiments for Security☆11Mar 27, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago