Purp1eW0lf / Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
☆1,586Updated last year
Related projects: ⓘ
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,882Updated 2 months ago
- game of active directory☆5,047Updated this week
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆1,976Updated 5 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,169Updated this week
- Tools and Techniques for Blue Team / Incident Response☆2,664Updated 5 months ago
- Tools & Interesting Things for RedTeam Ops☆2,129Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,448Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,206Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,796Updated 2 months ago
- Incident Response Methodologies 2022☆925Updated 7 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,721Updated 3 months ago
- Orange Cyberdefense mindmaps☆1,007Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,658Updated 8 months ago
- OSWE, OSEP, OSED, OSEE☆2,571Updated 3 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,359Updated last week
- Red Teaming & Pentesting checklists for various engagements☆2,475Updated 3 weeks ago
- The Network Execution Tool☆2,854Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,447Updated this week
- SOC Interview Questions☆1,029Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,296Updated 9 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,509Updated 11 months ago
- ☆1,263Updated 2 years ago
- ☆2,156Updated 11 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆1,932Updated last year
- Practical Windows Forensics Training☆604Updated 6 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,715Updated 3 weeks ago
- Azure and AWS Attacks☆1,044Updated last year
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆1,995Updated last year
- Conference presentation slides☆1,442Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,504Updated 3 weeks ago