infosecn1nja / Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
☆14Updated 4 years ago
Alternatives and similar repositories for Seatbelt:
Users that are interested in Seatbelt are comparing it to the libraries listed below
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆15Updated 6 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Scripts and One-Liners☆21Updated 3 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- generates weak passwords based on current date☆42Updated 10 months ago
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆33Updated 3 months ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Simple bash script to enumerate Linux machines☆13Updated 6 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 3 weeks ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- PowerShell Pass The Hash Utils☆16Updated 6 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆52Updated 6 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago