DarkBlueCTT / Dark-BlueLinks
Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create custom practice images.
☆14Updated 3 years ago
Alternatives and similar repositories for Dark-Blue
Users that are interested in Dark-Blue are comparing it to the libraries listed below
Sorting:
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆100Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated last week
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- ☆133Updated 4 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆77Updated 2 years ago
- This repository is for the vagrant instances of VulnHub machines☆46Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Updated last year
- Corelight@Home script☆45Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Updated 2 weeks ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- 🔐 Vulnerability remediation scoring system☆129Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Search a filesystem for indicators of compromise (IoC).☆83Updated last month
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 4 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 3 years ago
- an awesome list of active defense resources☆129Updated 5 years ago
- Tools and scripts by Arctic Wolf☆70Updated 6 months ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆78Updated 5 years ago
- Defensive Origins Training Schedule☆39Updated 2 years ago
- ☆73Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- ☆15Updated 4 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 10 months ago
- Docker image for Velocidex Velociraptor☆145Updated last month
- Traps web spiders☆79Updated 5 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year