justintime / hibp-auditLinks
HIBP Audit - Audit Active Directory user accounts against HIBP
☆15Updated 4 years ago
Alternatives and similar repositories for hibp-audit
Users that are interested in hibp-audit are comparing it to the libraries listed below
Sorting:
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated last month
- Purple Team Security☆75Updated 3 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆78Updated 5 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Updated 2 years ago
- ☆42Updated 2 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- The PoLRBear Project☆35Updated 4 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Updated 2 years ago
- ☆21Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Updated last year
- ☆115Updated 6 years ago
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- FOR508 Index - GCFA☆21Updated 7 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Presentations☆17Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- incident response scripts☆19Updated 6 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Updated 4 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Updated 2 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆200Updated 7 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆89Updated 2 years ago