IndustryBestPractice / Bootsy
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆34Updated 5 years ago
Alternatives and similar repositories for Bootsy:
Users that are interested in Bootsy are comparing it to the libraries listed below
- Elastic Beat for fetching and shipping Office 365 audit events☆66Updated 4 years ago
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- Find accounts using common and default passwords in Active Directory.☆66Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆28Updated 4 years ago
- ☆54Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Azure Sentinel Template parser☆16Updated 4 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Jupyter notebooks☆22Updated 4 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 9 months ago
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆14Updated 3 years ago
- ☆41Updated last year
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆25Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated last month
- Defensive Origins Training Schedule☆37Updated last year
- Purple Team Security☆74Updated 2 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆76Updated 7 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- incident response scripts☆19Updated 5 years ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Checks our resources to monitor Identity Changes☆16Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆89Updated 2 years ago