IndustryBestPractice / Bootsy
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆34Updated 5 years ago
Alternatives and similar repositories for Bootsy:
Users that are interested in Bootsy are comparing it to the libraries listed below
- Build a domain with three quick PowerShell scripts!☆29Updated 4 years ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆38Updated 6 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- ☆15Updated 3 years ago
- ☆54Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆25Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- ☆11Updated 3 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Easily create index of your SANS books☆15Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- ☆21Updated 4 years ago
- Various components we use in labs☆10Updated 4 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Defence Against the Dark Arts☆34Updated 5 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- Purple Team Security☆75Updated 3 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year