joeavanzato / TrawlerLinks
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
☆322Updated 7 months ago
Alternatives and similar repositories for Trawler
Users that are interested in Trawler are comparing it to the libraries listed below
Sorting:
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆408Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated 2 years ago
- ☆123Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated last year
- ☆211Updated 2 weeks ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180Updated 6 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆269Updated 7 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated last month
- ☆160Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated 11 months ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆321Updated 2 months ago
- Documentation and scripts to properly enable Windows event logs.☆646Updated 2 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Updated 2 years ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆108Updated last year
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆92Updated 4 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆418Updated 4 months ago
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 8 months ago
- PowerShell module for Office 365 and Azure log collection☆275Updated 2 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆341Updated 2 weeks ago
- ☆168Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆320Updated 2 years ago
- Full of public notes and Utilities☆129Updated 10 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆478Updated last year
- VirtualGHOST Detection Tool☆100Updated 2 weeks ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆486Updated last year
- A collection of tools, scripts and personal research☆152Updated last week
- Ransomware simulator written in Golang☆460Updated 3 years ago
- Active C&C Detector☆156Updated 2 years ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆447Updated last month