Lists (1)
Sort Name ascending (A-Z)
Stars
Investigate malicious Windows logon by visualizing and analyzing Windows event log
A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.
Automation to assess the state of your M365 tenant against CISA's baselines
The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)
Security-Focused O365 Management and Log Scripts
Rapidly Search and Hunt through Windows Forensic Artefacts
This is my attempt at creating "container" based solutions, where every folder is a solution to a question, problem or business need that I tried to solve.
A curated list of Awesome Threat Intelligence resources
Collaborative Incident Response platform
santiandres33 / rita
Forked from activecm/rita-legacyReal Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
CloudMapper helps you analyze your Amazon Web Services (AWS) environments.
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
gym487 / gps-sdr-sim-realtime
Forked from osqzss/gps-sdr-simRealtime gps-sdr-sim with TCP stream output that can connect to gnuradio or anything else..
Here is where the magic happens. This is the scraper repository for AlwaysUpdate Project.