cno-io / bh_aws
Materials for AWS Training
☆15Updated 3 years ago
Alternatives and similar repositories for bh_aws:
Users that are interested in bh_aws are comparing it to the libraries listed below
- SilkETW & SilkService☆40Updated 5 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 5 years ago
- ☆12Updated 6 months ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Walking the PEB in VBA☆23Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- OSSEM Modular☆27Updated 4 years ago
- ☆53Updated 6 years ago
- ☆35Updated 5 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- gpocheck☆30Updated 8 months ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- ☆10Updated 4 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆13Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- ☆16Updated 7 years ago
- ☆17Updated 6 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 5 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago