BinaryDefense / artillery
The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
☆1,016Updated 3 years ago
Alternatives and similar repositories for artillery:
Users that are interested in artillery are comparing it to the libraries listed below
- Builds malware analysis Windows VMs so that you don't have to.☆1,039Updated 3 years ago
- An information security preparedness tool to do adversarial simulation.☆1,118Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Updated 7 years ago
- Incident Response Forensic Framework☆599Updated 5 years ago
- FAME Automates Malware Evaluation☆882Updated last month
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,011Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,264Updated 2 months ago
- ☆1,068Updated 5 years ago
- Your Everyday Threat Intelligence☆1,827Updated this week
- Modern Honey Network☆2,448Updated 3 months ago
- Fast Incident Response☆1,848Updated last week
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,587Updated 4 years ago
- Malcom - Malware Communications Analyzer☆1,157Updated 7 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆721Updated 5 years ago
- Modular file scanning/analysis framework☆618Updated 5 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Updated 8 months ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆624Updated 9 months ago
- A collection of sources of indicators of compromise.☆840Updated 5 months ago
- An informational repo about hunting for adversaries in your IT environment.☆1,756Updated 3 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆940Updated 3 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,319Updated this week
- Python low-interaction honeyclient☆1,006Updated last week
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,265Updated 3 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,536Updated last year
- Home of the dionaea honeypot☆738Updated 7 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,601Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,209Updated 4 years ago
- Machinae Security Intelligence Collector☆507Updated 10 months ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago