justintime / hibp-auditLinks
HIBP Audit - Audit Active Directory user accounts against HIBP
☆15Updated 3 years ago
Alternatives and similar repositories for hibp-audit
Users that are interested in hibp-audit are comparing it to the libraries listed below
Sorting:
- Purple Team Security☆75Updated 3 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- ☆67Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 5 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- ☆115Updated 6 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 4 years ago
- ☆42Updated 2 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Presentations☆17Updated 2 years ago
- A tool for auditing network shares in an Active Directory environment☆43Updated 6 years ago
- Helps with finding and registering categorized domains☆69Updated 4 years ago
- A series of scripts☆100Updated 3 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated 2 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- All my slides for any talks☆23Updated 10 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Personal repo for messing with scripts☆26Updated 3 years ago
- ☆150Updated 4 years ago
- PoSh BloodHound Dog Whisperer☆191Updated 2 years ago
- Find accounts using common and default passwords in Active Directory.☆69Updated 5 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago