trustedsec / defensive-scriptsLinks
☆47Updated last month
Alternatives and similar repositories for defensive-scripts
Users that are interested in defensive-scripts are comparing it to the libraries listed below
Sorting:
- Defence Against the Dark Arts☆34Updated 6 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Updated 2 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 3 years ago
- Windows Security Logging☆43Updated 3 years ago
- A tool for auditing network shares in an Active Directory environment☆44Updated 6 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 3 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 3 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Purple Team Security☆76Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Updated last year
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- PowerShell Memory Pulling script☆19Updated 10 years ago
- ☆29Updated 5 years ago
- Scripts and One-Liners☆21Updated 11 months ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 4 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆98Updated 4 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 5 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆106Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Updated 4 years ago