jeffjbowie / Nessus2Word
☆19Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Nessus2Word
- Threat Hunter's Knowledge Base☆21Updated 2 years ago
- ☆41Updated 7 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- ☆76Updated 4 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- Carbon Black Response IR tool☆53Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated last year
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- ☆10Updated 4 years ago
- ☆37Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆82Updated 5 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- TA505+ Adversary Simulation☆65Updated 3 years ago
- Scripts and One-Liners☆19Updated this week
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆21Updated 4 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated last year
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- Virtual Security Operations Center☆49Updated last year
- BloodHound Data Scanner☆43Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated last year
- Presentations☆17Updated 2 years ago
- Phishing campaign docker composition for Gophish☆36Updated last month
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago