IndustryBestPractice / BootsyLinks
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆34Updated 6 years ago
Alternatives and similar repositories for Bootsy
Users that are interested in Bootsy are comparing it to the libraries listed below
Sorting:
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated last month
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- ☆55Updated 4 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Updated last year
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Purple Team Security☆75Updated 3 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- ☆16Updated 4 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Updated 2 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Updated 4 years ago
- ☆45Updated 2 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- Easily create index of your SANS books☆19Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆78Updated 5 years ago
- Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.☆46Updated 5 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Updated 5 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆39Updated 5 years ago
- Defence Against the Dark Arts☆34Updated 6 years ago
- ☆73Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago