Discover "HotSpots" - potential spots for credentials theft
-
Updated
Apr 12, 2018 - PowerShell
Discover "HotSpots" - potential spots for credentials theft
Just a place for me to put things I write down so they can be shared with the the community
Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend products.
This script is inelegant but straightforward and identifies downloaded files and the url from which the file was downloaded (if ADS Zone Identifier is available) in the System32 directory. Additionally, it also identifies .iso and .img files in the user's download directory. This is intended for Incident Responders, SOC Analysts, and Threat Rese…
A mirror of several precompiled standalone red-teaming tools.
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Enhance the security and compliance of your standalone Windows servers with our STIG script, specifically designed to meet DoD STIG/SRG requirements and NSACyber guidance. Achieve ultimate Windows Server protection with our easy-to-use script.
Create a compliant and secure Windows 10/11 system with our Gold Master image creation tool. Adhere to DoD STIG/SRG Requirements and NSA Cybersecurity guidance for standalone Windows systems with ease, using our ultimate STIG script.
Enhance the security and privacy of your Windows 10 and Windows 11 deployments with our fully optimized, hardened, and debloated script. Adhere to industry best practices and Department of Defense STIG/SRG requirements for optimal performance and security.
A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerShell commands.
Windows Exploit Protection Settings (Ultimate)
The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.
Add a description, image, and links to the cyber topic page so that developers can more easily learn about it.
To associate your repository with the cyber topic, visit your repo's landing page and select "manage topics."