rtkwlf / wolf-toolsLinks
Tools and scripts by Arctic Wolf
☆69Updated 2 months ago
Alternatives and similar repositories for wolf-tools
Users that are interested in wolf-tools are comparing it to the libraries listed below
Sorting:
- ☆42Updated 2 years ago
- ☆67Updated 4 years ago
- CrowdStrike Archive Scan Tool☆84Updated 3 years ago
- ☆72Updated 2 years ago
- Collection of useful Canary tools☆88Updated last month
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- Provides various Windows Server Active Directory (AD) security-focused reports.☆103Updated 2 months ago
- Security-Focused O365 Management and Log Scripts☆62Updated 2 years ago
- ☆50Updated 5 years ago
- ☆67Updated 2 weeks ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 4 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated last year
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated this week
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated 5 years ago
- ☆181Updated 3 weeks ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 5 years ago
- ☆55Updated 4 years ago
- A series of scripts☆100Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆37Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Easily create index of your SANS books☆18Updated 2 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago