vector-sec / DuoPusherLinks
Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications
☆13Updated 7 years ago
Alternatives and similar repositories for DuoPusher
Users that are interested in DuoPusher are comparing it to the libraries listed below
Sorting:
- Crack your macros like the math pros.☆33Updated 8 years ago
- ☆52Updated 7 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆87Updated 8 years ago
- An offensive Powershell console☆30Updated 9 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆50Updated 6 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆56Updated last year
- SilkETW & SilkService☆40Updated 6 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Server for receiving autorun data from the clients☆13Updated 8 years ago
- ☆16Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 9 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- ☆53Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Set of utilities for getting information about Windows Events☆15Updated 7 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- ☆41Updated 7 years ago
- Registry Miner☆14Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Oracle Attacks Tool☆13Updated 9 years ago