IndustryBestPractice / Bootsy
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆34Updated 5 years ago
Alternatives and similar repositories for Bootsy
Users that are interested in Bootsy are comparing it to the libraries listed below
Sorting:
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Azure Sentinel Template parser☆16Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 4 years ago
- ☆54Updated 3 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆38Updated 6 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- incident response scripts☆19Updated 6 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆25Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- ☆39Updated 5 years ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 7 months ago
- Jupyter notebooks☆25Updated 4 years ago
- Automated forensics written in PowerShell☆34Updated 5 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆45Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago