Purp1eW0lf / Blue-Team-NotesLinks
You didn't think I'd go and leave the blue team out, right?
☆1,730Updated last month
Alternatives and similar repositories for Blue-Team-Notes
Users that are interested in Blue-Team-Notes are comparing it to the libraries listed below
Sorting:
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,049Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,621Updated last week
- Incident Response Methodologies 2022☆1,101Updated 10 months ago
- Practical Windows Forensics Training☆714Updated last year
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,089Updated 3 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,248Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,438Updated 3 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Updated 3 months ago
- Orange Cyberdefense mindmaps☆1,524Updated 11 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,921Updated 3 weeks ago
- Tools and Techniques for Blue Team / Incident Response☆3,916Updated 10 months ago
- SOC Interview Questions☆1,261Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,250Updated 7 months ago
- Labs for Practical Malware Analysis & Triage☆1,072Updated last month
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,495Updated 2 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,239Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,068Updated 8 months ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆878Updated 2 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,847Updated last week
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆670Updated 2 years ago
- Free hands-on digital forensics labs for students and faculty☆2,416Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,322Updated last month
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,538Updated last year
- Azure and AWS Attacks☆1,112Updated 3 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,207Updated last week
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆606Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,142Updated 10 months ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,433Updated this week
- ☆891Updated 2 years ago
- ☆2,382Updated 2 years ago