mr-r3b00t / soc_chef
Security Operations Chef
☆17Updated last week
Alternatives and similar repositories for soc_chef:
Users that are interested in soc_chef are comparing it to the libraries listed below
- A tool for mapping cyber crime☆136Updated last week
- List of tools and resources for pentesting Microsoft Active Directory☆64Updated this week
- ☆16Updated 6 months ago
- ☆74Updated last month
- Deny list generator for password filters☆25Updated 8 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆185Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆72Updated last week
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆99Updated 8 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆54Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆145Updated 4 months ago
- God Mode Detection Rules☆134Updated 8 months ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆14Updated last year
- ☆164Updated 2 weeks ago
- ☆55Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆182Updated 7 months ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 6 months ago
- ☆55Updated last year
- Automated security lab provisioning☆73Updated last month
- Dredging up secrets from the depths of the file system☆126Updated 5 months ago
- User Enumeration of Microsoft Teams users via API☆154Updated last year