DarkBlueCTT / Dark-BlueLinks
Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create custom practice images.
☆14Updated 3 years ago
Alternatives and similar repositories for Dark-Blue
Users that are interested in Dark-Blue are comparing it to the libraries listed below
Sorting:
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- This repository is for the vagrant instances of VulnHub machines☆46Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- A useful wordlist made from French Canadian leaked passwords!☆69Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆76Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- ☆73Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated last week
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- ☆23Updated 5 years ago
- Cyber Patriot scripts for the IX competition.☆85Updated 6 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year