DSU-DefSec / DWAYNE-INATOR-5000Links
Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.
☆26Updated 3 months ago
Alternatives and similar repositories for DWAYNE-INATOR-5000
Users that are interested in DWAYNE-INATOR-5000 are comparing it to the libraries listed below
Sorting:
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆25Updated last month
- Automated security lab provisioning☆75Updated last week
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 2 months ago
- ☆121Updated last year
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- ☆12Updated last month
- Search Index Database Reporter☆110Updated 7 months ago
- Repo of RIT CCDC Team Scripts☆14Updated 3 years ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆154Updated last year
- A repository to share publicly available Velociraptor detection content☆170Updated this week
- Windows Malware Investigation Scripts & Docs☆83Updated 6 months ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- ☆247Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 5 months ago
- Creation of a laboratory for malware analysis in AWS☆97Updated 2 years ago
- Tuoni☆118Updated this week
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆145Updated 3 weeks ago
- Retired TrustedSec Capabilities☆246Updated 6 months ago
- Infrastructure Automation☆350Updated last year
- Sigma rules to share with the community☆122Updated 4 months ago
- UFSIT scripts and tools for hardening and auditing☆13Updated last week
- ☆68Updated 5 months ago
- ☆201Updated 7 months ago
- Powershell module for VMWare vSphere forensics☆152Updated 6 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- A specification and style guide for YARA rules☆48Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆190Updated 11 months ago
- ☆35Updated 4 months ago