lkarlslund / adalanche-sampledataLinks
Explore the GOAD Active Directory lab in 5 minutes with Adalanche
☆41Updated 11 months ago
Alternatives and similar repositories for adalanche-sampledata
Users that are interested in adalanche-sampledata are comparing it to the libraries listed below
Sorting:
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated 4 months ago
- VirtualGHOST Detection Tool☆101Updated 3 weeks ago
- ASR Configurator, Essentials and Atomic Testing☆98Updated 8 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- DShield Sensor Log Collection with ELK☆46Updated last week
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆60Updated 2 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Updated 4 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 8 months ago
- ☆74Updated 2 weeks ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- ☆49Updated 3 weeks ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆154Updated 3 weeks ago
- Presentations from Conferences☆30Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆57Updated 6 months ago
- ☆28Updated 2 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- Slides of my public talks☆56Updated 2 years ago
- Living off the False Positive!☆41Updated 11 months ago
- Visualize Microsoft Defender XDR process trees and security events☆34Updated 4 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Updated 4 months ago
- ☆19Updated 3 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆48Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 2 weeks ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Updated 2 months ago