IndustryBestPractice / Bootsy
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆34Updated 5 years ago
Alternatives and similar repositories for Bootsy:
Users that are interested in Bootsy are comparing it to the libraries listed below
- Find accounts using common and default passwords in Active Directory.☆66Updated 5 years ago
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆118Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 4 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- ☆41Updated last year
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Jupyter notebooks☆23Updated 4 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆87Updated 2 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆25Updated 4 years ago
- ☆54Updated 3 years ago
- Tony's collection of powershell scripts, typically geared toward cybersec☆32Updated last week
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.☆46Updated 5 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- incident response scripts☆19Updated 5 years ago
- Easily create index of your SANS books☆15Updated 2 years ago
- Azure Sentinel Template parser☆16Updated 4 years ago
- ☆21Updated 4 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆66Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- ☆60Updated 3 years ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- The PoLRBear Project☆35Updated 3 years ago
- Purple Team Security☆74Updated 2 years ago