☆433Jan 28, 2022Updated 4 years ago
Alternatives and similar repositories for SME
Users that are interested in SME are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NMAP Vulnerability Scanning Scripts☆626Mar 4, 2022Updated 4 years ago
- Logging Made Easy☆709Nov 1, 2023Updated 2 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Dec 27, 2021Updated 4 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Dec 27, 2022Updated 3 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,280Dec 6, 2022Updated 3 years ago
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆708Sep 26, 2023Updated 2 years ago
- A module that allows for easier object handling with Key Vault secrets.☆13Jun 16, 2021Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- ☆21Apr 16, 2023Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- Cybersecurity Evaluation Tool☆1,790Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- ☆14Feb 22, 2021Updated 5 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,438Jul 3, 2024Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A repository of sysmon configuration modules☆2,996Aug 21, 2024Updated last year
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,923Feb 26, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,369Updated this week
- Scripts to get the most out of Tenable.io☆12Feb 10, 2021Updated 5 years ago
- ☆11Mar 29, 2022Updated 4 years ago
- ☆2,392Oct 14, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,078Dec 11, 2024Updated last year
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆474Dec 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Apr 26, 2025Updated 11 months ago
- This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 a…☆455Mar 4, 2026Updated 3 weeks ago
- BlueHound - pinpoint the security issues that actually matter☆760Jul 12, 2023Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,435Nov 23, 2022Updated 3 years ago