sandflysecurity / sandfly-ssh-security-scannerLinks
Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.
☆23Updated 3 months ago
Alternatives and similar repositories for sandfly-ssh-security-scanner
Users that are interested in sandfly-ssh-security-scanner are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated last week
- ☆74Updated this week
- DEFCON 31 slide deck and video link☆66Updated 7 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 8 months ago
- Living off the False Positive!☆41Updated 11 months ago
- ☆50Updated this week
- Slides of my public talks☆56Updated 2 years ago
- ☆28Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- ESXi Cyber Security Incident Response Script☆25Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated last year
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- ASR Configurator, Essentials and Atomic Testing☆98Updated 8 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆154Updated last month
- Detection rule validation☆40Updated 2 years ago
- ☆33Updated last year
- ☆110Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- God Mode Detection Rules☆134Updated last year
- Elastic version of SOC prime watcher rules☆30Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated 2 months ago