☆76Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for detect-responder
Users that are interested in detect-responder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆350Mar 19, 2021Updated 5 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- ☆281Dec 5, 2017Updated 8 years ago
- A central place for me to share interesting PSRemoting configurations☆16Jun 28, 2017Updated 8 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- Currently not updated for WMIEvent module...☆263Feb 23, 2016Updated 10 years ago
- ☆16Dec 16, 2020Updated 5 years ago
- Respounder detects presence of responder in the network.☆323Jun 15, 2019Updated 6 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 7 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆98Mar 16, 2016Updated 10 years ago
- A C# implementation of the PowerShell Empire Agent☆73Apr 22, 2019Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- ☆266Oct 25, 2025Updated 6 months ago
- Assorted scripts and one off things☆272Aug 20, 2024Updated last year
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Spam trap management☆24Jun 18, 2024Updated last year
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆174Jun 10, 2021Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- Some PowerShell Stuff☆280Jun 15, 2022Updated 3 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Jun 26, 2018Updated 7 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 5 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆142Mar 7, 2018Updated 8 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆214Mar 29, 2021Updated 5 years ago