PacktPublishing / Purple-Team-Strategies
Purple Team Strategies, Published by Packt
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Purple-Team-Strategies
- Incident Response with Threat Intelligence, published by Packt☆49Updated 7 months ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆17Updated last year
- A repo to support the book☆40Updated last year
- Modules for my C2 course students to use for their own projects.☆73Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆41Updated 2 years ago
- A CALDERA plugin☆25Updated 3 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated last month
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 9 months ago
- ☆76Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 3 years ago
- Some of my rough notes for Docker threat detection☆46Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- ☆26Updated 2 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- ☆29Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆23Updated this week
- Mastering Malware Analysis - Second Edition, published by Packt.☆37Updated last year
- ☆16Updated last year
- List of Command&Control (C2) software☆34Updated 2 years ago
- ☆61Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆51Updated this week
- ☆24Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 5 months ago
- ☆41Updated 2 years ago
- Industrial Cybersecurity Second Edition, published by Packt☆23Updated last year