jangeisbauer / gundogView external linksLinks
gundog - guided hunting in Microsoft Defender
☆52Apr 29, 2021Updated 4 years ago
Alternatives and similar repositories for gundog
Users that are interested in gundog are comparing it to the libraries listed below
Sorting:
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Nov 12, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- PowerShell module for Office 365 and Azure log collection☆280Sep 22, 2025Updated 4 months ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once w…☆71Jan 16, 2025Updated last year
- ☆99Feb 16, 2021Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- Arkhota, a web brute forcer for Android.☆19Feb 15, 2023Updated 3 years ago
- Advanced Hunting Queries for Microsoft Security Products☆108Jan 10, 2023Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆45Dec 5, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated last year
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Repository of public reference frameworks for the DFIR community.☆121Jul 4, 2023Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆53Sep 21, 2023Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Dec 3, 2025Updated 2 months ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 4 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 7 months ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆16Nov 7, 2025Updated 3 months ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- ☆28May 25, 2021Updated 4 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago