littl3field / Audix
Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring
☆117Updated 5 years ago
Alternatives and similar repositories for Audix:
Users that are interested in Audix are comparing it to the libraries listed below
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Updated 6 years ago
- Purple Team Security☆75Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆142Updated 5 years ago
- Find accounts using common and default passwords in Active Directory.☆67Updated 5 years ago
- Some security related PowerShell scripts I developed.☆79Updated 6 years ago
- Smb Scanner from PingCastle☆124Updated 6 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Simulating Adversary Operations☆93Updated 6 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated 2 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 5 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- ☆168Updated 5 years ago
- Sysmon Tools for PowerShell☆229Updated 6 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- Office365 Log Analysis Framework☆82Updated 5 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆103Updated 2 years ago
- A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hard…☆198Updated 4 years ago
- ☆111Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆93Updated 7 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆176Updated last year
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Updated 5 years ago
- Invoke-LiveResponse☆147Updated 3 years ago
- ☆257Updated 4 months ago