cno-io / bh_aws
Materials for AWS Training
☆15Updated 3 years ago
Alternatives and similar repositories for bh_aws:
Users that are interested in bh_aws are comparing it to the libraries listed below
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆23Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- ☆41Updated 6 years ago
- Red Team Automation tool powered by go and terraform☆28Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- ☆17Updated 6 years ago
- ☆12Updated 6 months ago
- ☆52Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- In motherland, target network calls you!☆59Updated 6 years ago
- Walking the PEB in VBA☆22Updated 5 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆29Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago
- ☆34Updated 4 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 4 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago