chriselgee / SansPivotSheetLabLinks
Terraform project to build AWS instances for pivot practice
☆13Updated 2 years ago
Alternatives and similar repositories for SansPivotSheetLab
Users that are interested in SansPivotSheetLab are comparing it to the libraries listed below
Sorting:
- powershell script to simulate activity by a user☆21Updated 5 years ago
- ☆36Updated last year
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated last year
- SANS Holiday Hack Challenge write-up template☆23Updated 2 years ago
- Active Directory Purple Team Playbook☆112Updated 2 years ago
- A repo to support the book☆110Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 8 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆70Updated last week
- ☆47Updated last month
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆60Updated 10 years ago
- ☆49Updated 2 months ago
- Threat Simulation Indexes☆39Updated 6 months ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- ☆80Updated 6 years ago
- ☆61Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆151Updated last year
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 3 years ago
- Simple parser to get useful information from AWS S3 logs☆27Updated 4 years ago
- Defensive Origins Training Schedule☆39Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆60Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- Python utility to generate filesystem content for Obsidian.☆87Updated 2 years ago
- ☆167Updated 2 years ago
- ☆29Updated 5 years ago
- ☆122Updated last year
- ☆41Updated 5 years ago