Purp1eW0lf / Blue-Team-NotesLinks
You didn't think I'd go and leave the blue team out, right?
☆1,676Updated last month
Alternatives and similar repositories for Blue-Team-Notes
Users that are interested in Blue-Team-Notes are comparing it to the libraries listed below
Sorting:
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,002Updated 7 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,449Updated 3 weeks ago
- Incident Response Methodologies 2022☆1,063Updated 3 months ago
- Practical Windows Forensics Training☆670Updated last year
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,081Updated 10 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,625Updated 2 weeks ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,148Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,814Updated last month
- Orange Cyberdefense mindmaps☆1,361Updated 4 months ago
- SOC Interview Questions☆1,170Updated 10 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,797Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,209Updated 3 weeks ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,427Updated 2 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆656Updated 2 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,021Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,188Updated 3 weeks ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆777Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,477Updated 11 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,602Updated last week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,940Updated last month
- Tools and Techniques for Blue Team / Incident Response☆3,192Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,201Updated last week
- A resource containing all the tools each ransomware gangs uses☆1,066Updated last week
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆853Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆986Updated 3 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,016Updated last week
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆589Updated 9 months ago
- ☆1,549Updated 2 years ago
- OSWE, OSEP, OSED, OSEE☆3,257Updated 3 months ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆781Updated 2 years ago