bluemountaincyber / evidence-appView external linksLinks
Serverless AWS application to upload and hash evidence files.
☆23Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for evidence-app
Users that are interested in evidence-app are comparing it to the libraries listed below
Sorting:
- ☆13Feb 18, 2024Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- ☆14Mar 5, 2021Updated 4 years ago
- ☆15May 9, 2023Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- ☆17Sep 9, 2020Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 4 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago
- ☆23Jan 2, 2023Updated 3 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Mar 3, 2025Updated 11 months ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 3 months ago
- ☆31Mar 21, 2023Updated 2 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Apr 18, 2018Updated 7 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Jun 28, 2021Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆11Nov 24, 2022Updated 3 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- ☆41May 16, 2018Updated 7 years ago
- ☆45Nov 5, 2018Updated 7 years ago