william-stearns / sshprepLinks
Sets up all the layers needed to log in over ssh with ssh keys
☆17Updated 3 months ago
Alternatives and similar repositories for sshprep
Users that are interested in sshprep are comparing it to the libraries listed below
Sorting:
- ☆73Updated 2 years ago
- ☆42Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆73Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- ☆81Updated last year
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆87Updated 2 years ago
- The PoLRBear Project☆35Updated 4 years ago
- A PowerShell incident response script for quick triage☆81Updated 3 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- DDTTX Tabletop Trainings☆28Updated 4 years ago
- ☆167Updated last week
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆78Updated 2 weeks ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 2 weeks ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆62Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Defensive Origins Training Schedule☆39Updated last year
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆126Updated 3 years ago
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- My Jupyter Notebooks☆36Updated 7 months ago
- Conference presentations☆60Updated last week
- ☆73Updated last year
- ☆67Updated 4 years ago
- ☆27Updated 4 years ago
- Tools for simulating threats☆193Updated 2 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Updated 10 months ago
- Convert Sigma rules to LogRhythm searches☆22Updated 3 years ago
- Real-time Response scripts and schema☆119Updated last week