Purp1eW0lf / Blue-Team-NotesLinks
You didn't think I'd go and leave the blue team out, right?
☆1,684Updated 2 weeks ago
Alternatives and similar repositories for Blue-Team-Notes
Users that are interested in Blue-Team-Notes are comparing it to the libraries listed below
Sorting:
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,012Updated 8 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,475Updated 3 weeks ago
- Incident Response Methodologies 2022☆1,066Updated 4 months ago
- Practical Windows Forensics Training☆682Updated last year
- Orange Cyberdefense mindmaps☆1,406Updated 5 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,178Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,827Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,805Updated last year
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,083Updated 11 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,080Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,961Updated 2 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,285Updated 4 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,446Updated 2 weeks ago
- Tools & Interesting Things for RedTeam Ops☆2,215Updated 2 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,194Updated 2 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,786Updated last week
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆663Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,256Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,106Updated last month
- Useful resources for SOC Analyst and SOC Analyst candidates.☆793Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,615Updated last month
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,053Updated last week
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,173Updated 2 years ago
- Labs for Practical Malware Analysis & Triage☆1,005Updated 4 months ago
- Azure and AWS Attacks☆1,103Updated 2 years ago
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆594Updated 10 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,499Updated last year
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,338Updated this week
- ☆2,319Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,893Updated 4 months ago