DSU-DefSec / DWAYNE-INATOR-5000Links
Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.
☆26Updated 8 months ago
Alternatives and similar repositories for DWAYNE-INATOR-5000
Users that are interested in DWAYNE-INATOR-5000 are comparing it to the libraries listed below
Sorting:
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆28Updated last week
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆488Updated last month
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆625Updated last week
- Automated security lab provisioning☆84Updated 2 weeks ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 5 months ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆165Updated 7 months ago
- ☆50Updated last year
- ☆513Updated last year
- Tools to automatically create a SANS index based off the course pdf files.☆113Updated 5 years ago
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆448Updated 2 weeks ago
- Infrastructure Automation☆357Updated last year
- Sysmon configuration file template with default high-quality event tracing☆527Updated 2 months ago
- A GUI and CLI tool for removing bloat from executables☆431Updated 4 months ago
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- ☆122Updated last year
- ☆13Updated 3 weeks ago
- Tuoni☆189Updated 2 weeks ago
- Create lab environment for Linux Command Line course☆49Updated last year
- Documentation and scripts to properly enable Windows event logs.☆642Updated last month
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆170Updated 3 weeks ago
- Discord C2 for Redteam....Need a better name☆135Updated 2 years ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆396Updated 2 weeks ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,230Updated 4 months ago
- Jupyter Notebooks for the Blue Team☆148Updated 8 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆321Updated 6 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆409Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆414Updated last week
- A centralized and enhanced memory analysis platform☆508Updated 4 months ago