simeononsecurity / Windows-Hardening-CTFLinks
A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.
☆28Updated last year
Alternatives and similar repositories for Windows-Hardening-CTF
Users that are interested in Windows-Hardening-CTF are comparing it to the libraries listed below
Sorting:
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆38Updated 3 months ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- ☆80Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- General Content☆26Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Windows Event Log Auditor☆34Updated this week
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 2 years ago
- URL fingerprinting made easy☆87Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- ☆14Updated 4 months ago
- ☆14Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆24Updated 4 months ago
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- A few XDR Scripts☆22Updated 4 months ago
- Commands used in Windows penetration tests☆53Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago