shellsharks / assorted
☆11Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for assorted
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Ransomware Simulator for testing Blue Team Detections☆35Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆12Updated 3 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated last week
- Files to automatically deploy red team Active Directory test lab☆42Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆10Updated 2 years ago
- ☆15Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆43Updated last year
- ☆41Updated 7 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆17Updated 4 years ago
- Kerberoast Detection Script☆30Updated 3 weeks ago
- C# User Simulation☆33Updated 2 years ago
- A quick reference guide for python script development in DFIR☆16Updated 8 months ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆35Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago