DefensiveOrigins / LABPACKLinks
Various components we use in labs
☆10Updated 4 years ago
Alternatives and similar repositories for LABPACK
Users that are interested in LABPACK are comparing it to the libraries listed below
Sorting:
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 9 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- ☆30Updated 6 years ago
- Windows Security Logging☆43Updated 3 years ago
- ☆21Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- ☆11Updated 4 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆16Updated 6 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 7 months ago