IndustryBestPractice / BootsyLinks
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆34Updated 6 years ago
Alternatives and similar repositories for Bootsy
Users that are interested in Bootsy are comparing it to the libraries listed below
Sorting:
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 2 months ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆78Updated 5 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Updated 4 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 6 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Purple Team Security☆75Updated 3 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- ☆16Updated 4 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- Security Assessment Data Management and Analysis Tool☆38Updated 4 years ago
- Tony's collection of powershell scripts, typically geared toward cybersec☆34Updated last month
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Updated 6 years ago
- PowerShell Script for Windows Server Compliance / Security Configuration Audit☆63Updated 9 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 4 years ago
- ☆55Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- ☆192Updated last month
- Elastic Beat for fetching and shipping Office 365 audit events☆68Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Updated 2 years ago