infosecn1nja / Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
☆14Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Seatbelt
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- repository containing some nmap scripts☆11Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 6 years ago
- ☆45Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated last year
- ☆29Updated 6 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated 9 months ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- Bloodhound Portable for Windows☆51Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 3 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- A tool for auditing network shares in an Active Directory environment☆41Updated 5 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆28Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- OSCP Focused Lab Pastable with some general Red Teaming Pastables.☆10Updated 4 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆26Updated 3 weeks ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago