joeavanzato / ThreatSimLinks
Threat Simulator for Enterprise Networks
☆14Updated 3 years ago
Alternatives and similar repositories for ThreatSim
Users that are interested in ThreatSim are comparing it to the libraries listed below
Sorting:
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆55Updated 2 months ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated this week
- DShield Sensor Log Collection with ELK☆30Updated this week
- ☆19Updated this week
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 7 months ago
- ASR Configurator, Essentials and Atomic Testing☆88Updated 4 months ago
- Slides of my public talks☆56Updated last year
- ESXi Cyber Security Incident Response Script☆25Updated 11 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- ☆73Updated 10 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 8 months ago
- Living off the False Positive!☆38Updated 6 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17Updated 3 months ago
- ☆11Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Azure AD Incident Response☆26Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- ☆19Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 5 months ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated last week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- ☆47Updated 4 months ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆36Updated 3 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- ☆61Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 8 months ago