Defensive Origins Training Schedule
☆39Dec 11, 2023Updated 2 years ago
Alternatives and similar repositories for Training
Users that are interested in Training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Feb 3, 2023Updated 3 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- ☆50Jan 30, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Jan 22, 2021Updated 5 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆162Nov 29, 2021Updated 4 years ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 8 months ago
- Atomic Purple Team Framework and Lifecycle☆298Feb 11, 2021Updated 5 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bloodhound Reporting for Blue and Purple Teams☆1,281Nov 15, 2025Updated 4 months ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 7 months ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Powershell - web traffic whitenoise generator☆47Jun 4, 2020Updated 5 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Improved OpenVPN installer for Debian, Ubuntu, CentOS and Arch Linux☆10Feb 23, 2017Updated 9 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆301Mar 19, 2026Updated 3 weeks ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Mar 21, 2017Updated 9 years ago
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 4 years ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆111Dec 3, 2025Updated 4 months ago
- Import python libraries over HTTP☆13Oct 28, 2024Updated last year
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Apr 22, 2020Updated 5 years ago
- Profile info☆14Mar 12, 2024Updated 2 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆36Updated this week
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SCALE Planning☆16Jan 30, 2024Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 3 months ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 3 months ago
- SQL scripts for querying event logs☆21Jul 12, 2017Updated 8 years ago