DarkBlueCTT / Dark-Blue
Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create custom practice images.
☆12Updated 2 years ago
Alternatives and similar repositories for Dark-Blue:
Users that are interested in Dark-Blue are comparing it to the libraries listed below
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Data Driven Threat Hunting on the RaspberryPi☆29Updated 3 years ago
- Cyber Patriot scripts for the IX competition.☆80Updated 6 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- ☆45Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆51Updated 3 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆58Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 11 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 7 months ago
- Python API for interacting with sigma rules.☆51Updated 2 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆25Updated 8 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆25Updated 2 years ago
- A tool to host an Internet simulation☆54Updated 8 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- Corelight@Home script☆40Updated last year
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- SANS Slingshot Linux Distribution☆48Updated 4 years ago