tomwechsler / Ethical_Hacking_and_Penetration_TestingLinks
This repository is all about tips on ethical hacking and penetration testing!
☆47Updated this week
Alternatives and similar repositories for Ethical_Hacking_and_Penetration_Testing
Users that are interested in Ethical_Hacking_and_Penetration_Testing are comparing it to the libraries listed below
Sorting:
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆68Updated last month
- Security Scripts and Sources for daily usage.☆60Updated 3 weeks ago
- ☆44Updated last year
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆38Updated 6 months ago
- Conditional Access Reporting☆27Updated 2 months ago
- Advanced Hunting Queries☆17Updated last month
- ResearchDev - XDR & SIEM Detection☆64Updated last month
- AD Lab Setup Scripts☆73Updated 3 weeks ago
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆94Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆74Updated last month
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆47Updated this week
- ☆45Updated 3 weeks ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆16Updated 3 weeks ago
- Hunting Queries for Defender ATP☆82Updated last month
- This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365…☆58Updated last year
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Updated last year
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆102Updated 9 months ago
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆28Updated last month
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- ☆74Updated 2 months ago
- The purpose of this repository is to share KQL queries to help identify security misconfigurations, hunt for specific patterns, or detect…☆32Updated 3 weeks ago
- ☆26Updated 4 months ago
- ☆35Updated 2 weeks ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS security☆18Updated 7 months ago
- Content Repo for Demystifying KQL Tutorial Series☆70Updated 9 months ago
- Defender Resource Hub☆25Updated 2 weeks ago
- ☆75Updated 2 weeks ago
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆24Updated last year
- ☆62Updated last year