mr-r3b00t / OSCPLinks
☆15Updated 6 years ago
Alternatives and similar repositories for OSCP
Users that are interested in OSCP are comparing it to the libraries listed below
Sorting:
- ☆29Updated 4 years ago
- ☆20Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last month
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- ☆70Updated last year
- Defensive Origins Training Schedule☆38Updated last year
- LEQL examples for Rapid7 SIEM☆9Updated 4 years ago
- ☆47Updated 2 months ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆29Updated 4 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- My Jupyter Notebooks☆36Updated 4 months ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- ☆21Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- Some bash to make life easier after a new kali install..☆31Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- ☆48Updated 6 months ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago