hardwaterhacker / scandiff
Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff performs an nmap ndiff on the output against previous results, 7zips all generated output, and optionally emails all output to a specified email address.
☆17Updated 10 years ago
Alternatives and similar repositories for scandiff:
Users that are interested in scandiff are comparing it to the libraries listed below
- Maps process creation logged by Sysmon uses Google Org Chart API☆24Updated 8 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Sysmon configuration☆66Updated 6 years ago
- ☆22Updated 9 years ago
- incident response scripts☆19Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 6 years ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 9 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆48Updated 7 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Updated 9 years ago
- Windows PowerShell domain scanning tool☆54Updated 8 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆50Updated 7 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15Updated 5 years ago
- ☆31Updated 3 months ago
- Presentation Slides☆27Updated 5 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 3 years ago
- ☆36Updated 8 years ago
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆55Updated 8 years ago
- Automated forensics written in PowerShell☆34Updated 5 years ago
- Tools for parsing Forensic images☆41Updated 6 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆38Updated 7 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13Updated 6 years ago
- This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.☆43Updated 7 years ago
- ☆39Updated 5 years ago
- Executes PowerShell from an unmanaged process☆28Updated 10 years ago
- Tool to parse SRU database☆24Updated 6 years ago
- ☆51Updated 6 years ago
- ☆38Updated 9 years ago