hardwaterhacker / scandiff
Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff performs an nmap ndiff on the output against previous results, 7zips all generated output, and optionally emails all output to a specified email address.
☆17Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for scandiff
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆21Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆24Updated 8 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- incident response scripts☆18Updated 5 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Updated 8 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆50Updated 6 years ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 9 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 3 years ago
- ☆37Updated 8 years ago
- The AwesomerShell Code Sample☆49Updated 8 years ago
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆54Updated 8 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- ☆36Updated 8 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 6 years ago
- Windows PowerShell domain scanning tool☆54Updated 8 years ago
- Sysmon configuration☆66Updated 6 years ago
- Presentation Slides☆27Updated 5 years ago
- ☆31Updated 4 years ago
- Tools for parsing Forensic images☆41Updated 5 years ago