☆76Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for detect-responder
Users that are interested in detect-responder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆349Mar 19, 2021Updated 5 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- ☆282Dec 5, 2017Updated 8 years ago
- A central place for me to share interesting PSRemoting configurations☆16Jun 28, 2017Updated 8 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- ☆16Dec 16, 2020Updated 5 years ago
- Respounder detects presence of responder in the network.☆323Jun 15, 2019Updated 6 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 7 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆98Mar 16, 2016Updated 10 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- ☆265Oct 25, 2025Updated 5 months ago
- Assorted scripts and one off things☆271Aug 20, 2024Updated last year
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Spam trap management☆24Jun 18, 2024Updated last year
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆389Jun 25, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- Some PowerShell Stuff☆280Jun 15, 2022Updated 3 years ago
- A guide to setting up Windows and MacOS the way I like it☆22Jun 25, 2025Updated 9 months ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 4 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago