tenable / audit_files
Nessus Audit files
☆30Updated last year
Related projects ⓘ
Alternatives and complementary repositories for audit_files
- ☆42Updated last year
- ☆41Updated 7 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- ☆25Updated 3 years ago
- Kerberoast Detection Script☆30Updated last week
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆37Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated 3 weeks ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- ShellSweeping the evil.☆52Updated 4 months ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆46Updated 4 months ago
- ☆21Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆11Updated last month
- Slides and materials for conference presentations☆11Updated last year
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆111Updated last year