huntandhackett / Antignis
Source code and examples for Antignis
☆36Updated 2 years ago
Alternatives and similar repositories for Antignis:
Users that are interested in Antignis are comparing it to the libraries listed below
- ☆79Updated last year
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆49Updated 2 years ago
- Silver SAML forgery tool☆49Updated 11 months ago
- Kerberoast Detection Script☆30Updated 3 months ago
- Bloodhound Portable for Windows☆51Updated last year
- ☆15Updated 3 years ago
- ☆16Updated 2 years ago
- create a "simulated internet" cyber range environment☆15Updated 2 weeks ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 9 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated last month
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- POSIX script for mail security checks of domain names☆75Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated last week
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 3 years ago
- Look into EDR events from network☆23Updated 10 months ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆34Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Living off the False Positive!☆33Updated 3 weeks ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆48Updated this week
- blame Huy☆42Updated 4 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆15Updated 3 weeks ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆25Updated last year
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- ☆15Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆41Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testing☆36Updated 3 months ago
- Linux #rootkit and #malware revealer☆23Updated 6 months ago