huntandhackett / AntignisLinks
Source code and examples for Antignis
☆44Updated 3 years ago
Alternatives and similar repositories for Antignis
Users that are interested in Antignis are comparing it to the libraries listed below
Sorting:
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 3 years ago
- ☆80Updated 2 years ago
- ☆50Updated 5 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- ASR Configurator, Essentials and Atomic Testing☆99Updated 9 months ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆163Updated this week
- ☆19Updated 3 years ago
- Silver SAML forgery tool☆56Updated last year
- Kerberoast Detection Script☆30Updated last year
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Updated last year
- ☆34Updated 2 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆29Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 5 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆41Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated 2 months ago
- Find what egress ports are allowed☆45Updated last month
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Updated 4 years ago
- POSIX script for mail security checks of domain names☆75Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆189Updated last week