DSU-DefSec / DWAYNE-INATOR-5000
Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.
☆21Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for DWAYNE-INATOR-5000
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆16Updated 6 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆193Updated this week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆179Updated 10 months ago
- 🔐 Vulnerability remediation scoring system☆113Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆150Updated last week
- Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques☆306Updated 5 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆165Updated 4 months ago
- Anything Sysmon related from the MSTIC R&D team☆146Updated 5 months ago
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆166Updated 2 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆144Updated last year
- Docker image for Velocidex Velociraptor☆113Updated 4 months ago
- Rules generated from our investigations.☆188Updated last week
- A repository to share publicly available Velociraptor detection content☆119Updated this week
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆308Updated 2 weeks ago
- Automated security lab provisioning☆69Updated 3 months ago
- Jupyter Notebooks for the Blue Team☆141Updated last year
- A python script developed to process Windows memory images based on triage type.☆258Updated 11 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆194Updated 2 years ago
- Tools for simulating threats☆174Updated last year
- Signatures and IoCs from public Volexity blog posts.☆315Updated 3 months ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆509Updated this week
- Security Information and Event Management in Minecraft☆117Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆85Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆122Updated last week
- Resources To Learn And Understand SIGMA Rules☆167Updated last year
- ☆56Updated last week
- Windows Malware Investigation Scripts & Docs☆75Updated this week
- Infrastructure Automation☆322Updated 6 months ago
- Open Threat Hunting Framework☆102Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated 11 months ago