BinaryDefense / artillery
The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
☆1,017Updated 3 years ago
Alternatives and similar repositories for artillery:
Users that are interested in artillery are comparing it to the libraries listed below
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,012Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- Incident Response Forensic Framework☆601Updated 5 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,327Updated last week
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆331Updated 4 years ago
- ☆1,072Updated 6 years ago
- Fast Incident Response☆1,867Updated this week
- A collection of sources of indicators of compromise.☆855Updated 7 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,273Updated 3 months ago
- Modern Honey Network☆2,451Updated 5 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 9 months ago
- Malcom - Malware Communications Analyzer☆1,161Updated 7 years ago
- FAME Automates Malware Evaluation☆895Updated 3 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,606Updated 6 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,588Updated last year
- A Python Package for Data Exfiltration☆783Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Updated 4 years ago
- Incident Response Methodologies☆1,025Updated 6 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,087Updated 4 years ago
- Malicious HTTP traffic explorer☆716Updated 2 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Post Exploitation Collection☆1,563Updated 5 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,452Updated 3 months ago
- CRITs - Collaborative Research Into Threats☆901Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,774Updated 3 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,278Updated 3 years ago