huntandhackett / AntignisLinks
Source code and examples for Antignis
☆43Updated 2 years ago
Alternatives and similar repositories for Antignis
Users that are interested in Antignis are comparing it to the libraries listed below
Sorting:
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆78Updated 2 weeks ago
- Silver SAML forgery tool☆52Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 6 months ago
- Kerberoast Detection Script☆30Updated 7 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- create a "simulated internet" cyber range environment☆17Updated 3 weeks ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22Updated 3 years ago
- DEFCON 31 slide deck and video link☆63Updated 3 weeks ago
- A few XDR Scripts☆20Updated 3 months ago
- ☆80Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆52Updated 2 years ago
- Living off the False Positive!☆37Updated 4 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 5 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- ESXi Cyber Security Incident Response Script☆23Updated 9 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆28Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆107Updated 6 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆89Updated last week
- Monitor your PingCastle scans to highlight the rule diff between two scans☆112Updated 10 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- General Content☆26Updated 11 months ago
- ☆15Updated 3 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago