joeavanzato / Trawler
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
☆312Updated 2 months ago
Alternatives and similar repositories for Trawler:
Users that are interested in Trawler are comparing it to the libraries listed below
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆245Updated last year
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆366Updated 3 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆383Updated 3 weeks ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆184Updated this week
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆268Updated last week
- PowerShell Digital Forensics & Incident Response Scripts.☆548Updated 2 weeks ago
- ☆196Updated 2 months ago
- Documentation and scripts to properly enable Windows event logs.☆580Updated last year
- Sysmon configuration file template with default high-quality event tracing☆466Updated 11 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆166Updated 2 months ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆389Updated this week
- ScriptSentry finds misconfigured and dangerous logon scripts.☆439Updated 3 weeks ago
- ☆116Updated 9 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆452Updated 6 months ago
- Active Directory delegation management tool☆287Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆485Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆237Updated last month
- Windows Malware Investigation Scripts & Docs☆75Updated 2 months ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆153Updated 2 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆205Updated 2 months ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆517Updated 3 weeks ago
- An ADCS honeypot to catch attackers in your internal network.☆248Updated 6 months ago
- ☆686Updated last week
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆93Updated 4 months ago
- PowerShell module for Office 365 and Azure log collection☆253Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆183Updated last year
- An open-source self-hosted purple team management web application.☆248Updated this week
- Active C&C Detector☆152Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆110Updated 5 months ago