☆49Dec 11, 2025Updated 2 months ago
Alternatives and similar repositories for defensive-scripts
Users that are interested in defensive-scripts are comparing it to the libraries listed below
Sorting:
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Metasploit Framework☆29Dec 11, 2013Updated 12 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Various Topics☆18Apr 30, 2025Updated 10 months ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.☆79Sep 15, 2016Updated 9 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 9 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- A demonstration PowerShell module to analyze files for PowerShell commands.☆16Mar 7, 2025Updated 11 months ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 6 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 20, 2026Updated last week
- ☆17Jan 21, 2026Updated last month
- ☆19Jul 29, 2022Updated 3 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 3 years ago
- ☆170Aug 22, 2023Updated 2 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆49Nov 11, 2015Updated 10 years ago
- Documentation site for Velociraptor☆66Feb 14, 2026Updated 2 weeks ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆78Jan 9, 2024Updated 2 years ago
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Oct 4, 2022Updated 3 years ago
- Notes and Commands for CTFs☆22Apr 28, 2020Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago