brennodewinter / InformatiebeveiligingsonderzoekLinks
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆23Updated 8 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
Sorting:
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated last week
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- Collection of useful Canary tools☆88Updated 3 weeks ago
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆55Updated 2 years ago
- VirtualGHOST Detection Tool☆92Updated last year
- Mirror of cisa.gov/kev data files☆54Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 months ago
- ☆67Updated 4 years ago
- ☆175Updated this week
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 7 months ago
- ☆30Updated this week
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 7 months ago
- Outil de récupération automatique des données AZure / Automated tool for dumping Azure configuration data☆20Updated last week
- Source code and examples for Antignis☆43Updated 2 years ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 11 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 10 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆36Updated 3 years ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆35Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆134Updated last month
- Unleash the power of the Falcon Platform at the CLI☆123Updated 3 weeks ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆16Updated 8 months ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆117Updated last week
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆135Updated this week
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆126Updated 7 months ago
- A tool to identify and investigate inauthentic GitHub user accounts and repositories.☆13Updated 2 weeks ago