brennodewinter / Informatiebeveiligingsonderzoek
Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde
☆15Updated last month
Alternatives and similar repositories for Informatiebeveiligingsonderzoek:
Users that are interested in Informatiebeveiligingsonderzoek are comparing it to the libraries listed below
- ☆40Updated last year
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 8 months ago
- ☆60Updated 3 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- Automation around Entra ID☆33Updated last month
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆47Updated 2 years ago
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆41Updated last year
- Home for TRANSITS materials☆23Updated 5 months ago
- A WDAC configuration repository with the sole intention of enriching MDE☆28Updated last year
- ☆21Updated last year
- Scapy packet fragment reassembly engines☆34Updated 3 years ago
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago
- CSIRT Jump Bag☆27Updated 8 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Corelight@Home script☆40Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- Azure Sentinel Template parser☆16Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆68Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Updated 4 years ago
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆131Updated this week
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Updated 4 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆32Updated last month
- gmsad manages Active Directory group Managed Service Account (gMSA) on Linux☆27Updated last month
- A go-exploit to scan for implanted Cisco IOS XE Systems☆40Updated 2 months ago
- A tool that allows you to document and assess any security automation in your SOC☆43Updated 2 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago