Find potential Indicators of Compromise among similar Linux servers
☆29Oct 28, 2017Updated 8 years ago
Alternatives and similar repositories for distinct
Users that are interested in distinct are comparing it to the libraries listed below
Sorting:
- Network Appliance Backups in PowerShell☆29Jan 5, 2023Updated 3 years ago
- ☆14Apr 27, 2019Updated 6 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- LinkedIn Users Gather is a tool to extract all users fom a LinkedIn Company.☆10Jul 19, 2022Updated 3 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Lootbox downloads open directories shared on Twitter.☆35Mar 28, 2021Updated 4 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- ☆53May 21, 2018Updated 7 years ago
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 5 months ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- The new name is DeTT&CT☆24Jul 8, 2019Updated 6 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- ☆262Jul 6, 2018Updated 7 years ago
- ☆29Aug 9, 2016Updated 9 years ago
- ☆78Jan 15, 2026Updated last month
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆129Jan 28, 2018Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- PhishReporter Outlook Add-In in an Outlook Add-In that allows users to report phishing e-mails to a specific e-mail address for further p…☆35Jan 25, 2017Updated 9 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Dec 8, 2022Updated 3 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆201Dec 11, 2017Updated 8 years ago
- Office365 Log Analysis Framework☆81Jun 6, 2019Updated 6 years ago
- Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain na…☆140Jan 10, 2020Updated 6 years ago
- ☆202Oct 31, 2021Updated 4 years ago
- SEC599 supporting GitHub repository☆16Sep 14, 2019Updated 6 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Aug 21, 2018Updated 7 years ago
- Seconds to make any standard list view to be a powerful mass editor☆10Dec 10, 2017Updated 8 years ago
- Click To Cloud DevOps Toolbox☆15Sep 14, 2020Updated 5 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 2 weeks ago
- Salesforce Custom Apex REST WebService (@RestResource annotation)☆10Dec 25, 2017Updated 8 years ago