brennodewinter / Informatiebeveiligingsonderzoek
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆19Updated 3 months ago
Alternatives and similar repositories for Informatiebeveiligingsonderzoek:
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 10 months ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- ☆60Updated 3 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 11 months ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 2 years ago
- ☆41Updated last year
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆50Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- ☆17Updated 2 years ago
- Source code and examples for Antignis☆37Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆65Updated last year
- ☆63Updated last month
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆17Updated this week
- ☆77Updated 2 years ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Updated 3 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Various components we use in labs☆10Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆43Updated 3 weeks ago
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Generate test data that is not only realistic but also contextually meaningful☆25Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 6 months ago
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12Updated last year
- Scanner which is capable of scanning multiple hosts or multiple subnets on an SSL port and output a CSV file with the certificate details…☆14Updated 11 years ago
- Ansible role for installing Sysmon with popular config files included.☆24Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago