Find potential Indicators of Compromise among similar Linux servers
☆29Oct 28, 2017Updated 8 years ago
Alternatives and similar repositories for distinct
Users that are interested in distinct are comparing it to the libraries listed below
Sorting:
- Network Appliance Backups in PowerShell☆29Jan 5, 2023Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- The new name is DeTT&CT☆24Jul 8, 2019Updated 6 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 6 months ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆35Mar 28, 2021Updated 4 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- ☆53May 21, 2018Updated 7 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- SEC599 supporting GitHub repository☆16Sep 14, 2019Updated 6 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 6 months ago
- Extract common Windows artifacts from source images and VSCs☆65May 10, 2021Updated 4 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆130Jan 28, 2018Updated 8 years ago
- ☆29Aug 9, 2016Updated 9 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 2 months ago
- Web application to create indexes for GIAC certification examinations.☆151Apr 12, 2023Updated 2 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Ansible playbook to install cuckoo sandbox.☆11Mar 8, 2019Updated 7 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆40Aug 21, 2018Updated 7 years ago
- ☆78Mar 13, 2026Updated last week
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Dec 8, 2022Updated 3 years ago
- Monitor your domains for newly issued certificates and alert to Slack in near-realtime☆10Aug 29, 2022Updated 3 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago