DSU-DefSec / DWAYNE-INATOR-5000Links
Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.
☆26Updated 4 months ago
Alternatives and similar repositories for DWAYNE-INATOR-5000
Users that are interested in DWAYNE-INATOR-5000 are comparing it to the libraries listed below
Sorting:
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆25Updated this week
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆584Updated last week
- Automated security lab provisioning☆78Updated last week
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆473Updated 2 months ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 3 months ago
- Infrastructure Automation☆350Updated last year
- ☆12Updated 3 months ago
- ☆499Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆196Updated last year
- ☆122Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Tuoni☆121Updated last month
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆402Updated 3 months ago
- a tool to help operate in EDRs' blind spots☆743Updated 7 months ago
- Tools to automatically create a SANS index based off the course pdf files.☆103Updated 4 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆398Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆317Updated 2 months ago
- Documentation and scripts to properly enable Windows event logs.☆620Updated last year
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆187Updated last week
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 2 weeks ago
- Windows Malware Investigation Scripts & Docs☆83Updated 8 months ago
- Tools for simulating threats☆188Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆364Updated 11 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆317Updated last week
- A python script developed to process Windows memory images based on triage type.☆263Updated last year
- ☆251Updated last year
- AssemblyLine 4: File triage and malware analysis☆337Updated last week
- ☆45Updated 7 months ago
- ☆203Updated 8 months ago