Pinned Repositories
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active D
Intune-ACSC-Windows-Hardening-Guidelines
Collection of Intune policies that could assist with implementing ACSC's Windows hardening guidance.
sentient-sloth's Repositories
sentient-sloth/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active D
sentient-sloth/Intune-ACSC-Windows-Hardening-Guidelines
Collection of Intune policies that could assist with implementing ACSC's Windows hardening guidance.