Purp1eW0lf / Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
☆1,647Updated last year
Alternatives and similar repositories for Blue-Team-Notes:
Users that are interested in Blue-Team-Notes are comparing it to the libraries listed below
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,974Updated 3 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,101Updated 11 months ago
- Orange Cyberdefense mindmaps☆1,235Updated 3 weeks ago
- Tools & Interesting Things for RedTeam Ops☆2,177Updated 2 years ago
- Incident Response Methodologies 2022☆1,041Updated last year
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,851Updated last year
- Practical Windows Forensics Training☆651Updated last year
- OSCP Cheatsheet by Sai Sathvik☆1,027Updated 6 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,775Updated 10 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,084Updated last week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,355Updated last month
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,363Updated last week
- game of active directory☆6,229Updated 3 weeks ago
- Tools and Techniques for Blue Team / Incident Response☆3,037Updated last week
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,111Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,942Updated 3 weeks ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,783Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,750Updated last week
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆645Updated last year
- ☆2,257Updated last year
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,508Updated 9 months ago
- A resource containing all the tools each ransomware gangs uses☆997Updated 2 weeks ago
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,066Updated 7 months ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,259Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,554Updated 2 years ago
- SOC Interview Questions☆1,132Updated 6 months ago
- Azure Security Resources and Notes☆1,530Updated 9 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,345Updated 4 months ago
- Labs for Practical Malware Analysis & Triage☆951Updated 2 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,312Updated 4 months ago