Purp1eW0lf / Blue-Team-NotesLinks
You didn't think I'd go and leave the blue team out, right?
☆1,689Updated last month
Alternatives and similar repositories for Blue-Team-Notes
Users that are interested in Blue-Team-Notes are comparing it to the libraries listed below
Sorting:
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,024Updated 9 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,486Updated last month
- Practical Windows Forensics Training☆689Updated last year
- Incident Response Methodologies 2022☆1,069Updated 5 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,189Updated last year
- Orange Cyberdefense mindmaps☆1,420Updated 6 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,319Updated 5 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,279Updated 3 weeks ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,836Updated last week
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,085Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,978Updated 3 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,101Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,809Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆663Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,219Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,626Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆1,126Updated last week
- Useful resources for SOC Analyst and SOC Analyst candidates.☆806Updated 2 years ago
- SOC Interview Questions☆1,192Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,462Updated 2 weeks ago
- Labs for Practical Malware Analysis & Triage☆1,017Updated 5 months ago
- Azure and AWS Attacks☆1,106Updated 2 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,197Updated 2 months ago
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆598Updated 11 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,058Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,907Updated 5 months ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆690Updated 11 months ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,178Updated 2 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,502Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆688Updated 4 months ago