DarkBlueCTT / Dark-Blue
Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create custom practice images.
☆12Updated 2 years ago
Alternatives and similar repositories for Dark-Blue:
Users that are interested in Dark-Blue are comparing it to the libraries listed below
- Cyber Patriot scripts for the IX competition.☆78Updated 5 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆23Updated last month
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 9 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- ☆17Updated 4 years ago
- Corelight@Home script☆40Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆22Updated 8 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆97Updated 11 months ago
- Cheat sheets for threat hunting, detection and other stuff.☆33Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆53Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆50Updated 3 years ago
- US Government controls formatted for usability☆17Updated 3 years ago
- Collection of useful Canary tools☆75Updated last month
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Penguin OS Forensic (or Flight) Recorder☆38Updated last month
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- AIL project training materials☆27Updated last month
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- powershell script to simulate activity by a user☆21Updated 4 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- Learn about a network from a pcap file or reading from an interface☆28Updated 9 months ago