☆53May 21, 2018Updated 7 years ago
Alternatives and similar repositories for OAuthHunting
Users that are interested in OAuthHunting are comparing it to the libraries listed below
Sorting:
- ☆398Updated this week
- AWS managed IAM policies☆16Mar 24, 2022Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Aug 12, 2024Updated last year
- Powershell Persistence Locator☆67Sep 11, 2016Updated 9 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆201Dec 11, 2017Updated 8 years ago
- ☆33Nov 21, 2024Updated last year
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Feb 28, 2018Updated 8 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- The Outlook HTML Leak Test Project☆130May 12, 2018Updated 7 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- A simple webhook server☆12May 25, 2021Updated 4 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- ☆49Jan 13, 2020Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆110Jan 26, 2021Updated 5 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Re-implementation of Apple's Continuity Protocol☆19Dec 5, 2019Updated 6 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago