chrissistrunk / SecurityAxioms
This is a list of Computer and Network Security Axioms
☆29Updated 4 years ago
Related projects: ⓘ
- ☆35Updated this week
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- ☆133Updated this week
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆47Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- Scoring Engine for CTF competitions☆46Updated last year
- ☆85Updated this week
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 5 years ago
- This is a logon script used to detect the theft of credentials by tools such as Mimikatz☆116Updated 9 years ago
- A collection of infosec related scripts and information.☆53Updated last week
- Use Markov Chains to obfuscate data as other data☆49Updated 8 years ago
- ☆54Updated 4 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆71Updated 6 years ago
- ☆17Updated 4 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆66Updated 6 years ago
- ☆61Updated 6 years ago
- ☆17Updated 7 years ago
- ☆51Updated 6 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Updated 7 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆77Updated 6 years ago
- A collection of typical false positive indicators☆54Updated 3 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 3 years ago
- ☆25Updated this week
- Security Product Taskbar Icons (to identify from screenshots)☆56Updated 4 years ago