ukncsc / SMELinks
☆436Updated 3 years ago
Alternatives and similar repositories for SME
Users that are interested in SME are comparing it to the libraries listed below
Sorting:
- NMAP Vulnerability Scanning Scripts☆629Updated 3 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆787Updated 2 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 3 years ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆932Updated 3 weeks ago
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,081Updated 11 months ago
- InsightVM helpful SQL queries☆69Updated 5 months ago
- BlueHound - pinpoint the security issues that actually matter☆742Updated 2 years ago
- ☆631Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆852Updated 3 years ago
- Contact: CRT@crowdstrike.com☆737Updated 2 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆484Updated 8 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,426Updated 2 years ago
- CISA's catalog of bad practices that are exceptionally risky.☆209Updated 2 months ago
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 9 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,193Updated last month
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆297Updated 10 months ago
- Tools for hunting for threats.☆593Updated 3 months ago
- DShield Raspberry Pi Sensor☆483Updated this week
- Bloodhound Reporting for Blue and Purple Teams☆1,214Updated 5 months ago
- Sysmon configuration file template with default high-quality event tracing☆502Updated last month
- E-Mail Header Analyzer☆685Updated 2 years ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,026Updated 3 weeks ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last week
- SMBeagle - Fileshare auditing tool.☆721Updated 6 months ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆871Updated 5 months ago
- Logging Made Easy☆712Updated last year
- A list of my personal projects☆178Updated 2 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆783Updated 2 years ago