trustedsec / defensive-scriptsLinks
☆46Updated 2 years ago
Alternatives and similar repositories for defensive-scripts
Users that are interested in defensive-scripts are comparing it to the libraries listed below
Sorting:
- Defence Against the Dark Arts☆34Updated 5 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆53Updated 2 years ago
- Defensive-oriented Active Directory enumeration☆24Updated 9 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Windows Security Logging☆43Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆53Updated last year
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆34Updated 6 years ago
- OSSEM Modular☆27Updated 5 years ago
- ☆32Updated 8 months ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 9 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 7 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆93Updated 3 years ago
- ☆93Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago