huner2 / Cyber-Security-ScriptsLinks
Scripts for securing Windows, Debian, and Ubuntu machines.
☆22Updated 7 years ago
Alternatives and similar repositories for Cyber-Security-Scripts
Users that are interested in Cyber-Security-Scripts are comparing it to the libraries listed below
Sorting:
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- ☆81Updated 5 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- ☆39Updated 5 years ago
- ☆58Updated 5 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆216Updated 7 years ago
- ☆25Updated 2 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Updated 3 years ago
- Powershell script to exfiltrate large files quickly and securely☆126Updated 3 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆80Updated 7 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Gather Open-Source Intelligence using PowerShell.☆177Updated 5 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆41Updated 9 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- A toolkit for Security Researchers☆127Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- One line PS scripts that may come handy during your network assesment☆78Updated 5 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆128Updated 7 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Customized Kali Linux - Ansible playbook☆64Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 8 years ago
- PowerShellUtilities provides various utility commandlets.☆51Updated 5 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago