Threat Mitigation Strategies
☆29Feb 18, 2026Updated 3 months ago
Alternatives and similar repositories for threat-mitigation
Users that are interested in threat-mitigation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Event Data Collector☆40Mar 23, 2026Updated last month
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆115Nov 19, 2024Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆16Dec 16, 2020Updated 5 years ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- ☆14Dec 12, 2022Updated 3 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆55Jul 11, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- read the docs version of risk management☆27Mar 6, 2023Updated 3 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self…☆28May 6, 2022Updated 4 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 13, 2026Updated last month
- ☆13Dec 27, 2023Updated 2 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- ☆15May 22, 2021Updated 4 years ago
- JIRA CLI☆20Sep 16, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Mar 21, 2025Updated last year
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Deploy Kolide's Fleet into AWS using Terraform.☆16Apr 18, 2018Updated 8 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 7 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 3 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A collection of AD, Exchange & 365 tools used by consultants while on a project☆17Feb 20, 2019Updated 7 years ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- Windows Hardening Powershell Scripts☆25Oct 3, 2025Updated 7 months ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 7 years ago
- ☆16Dec 20, 2021Updated 4 years ago