RoseSecurity / Obfusc8tedLinks
You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they did not notice any anomalous activity while browsing the web, but the AppleLabs' system information and event management (SIEM) instance alerted on a suspicious domain. Mo…
☆77Updated 3 years ago
Alternatives and similar repositories for Obfusc8ted
Users that are interested in Obfusc8ted are comparing it to the libraries listed below
Sorting:
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆48Updated 7 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated last year
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 4 years ago
- ☆15Updated 6 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆71Updated 5 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Find and notify users in your Active Directory with weak passwords☆102Updated 4 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- ☆29Updated 4 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated last month
- ☆133Updated 4 years ago
- Let's obscure some IPv4 addresses☆37Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆94Updated 4 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 months ago
- Defensive Origins Training Schedule☆38Updated last year
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Collection of useful Canary tools☆91Updated 2 months ago
- Defence Against the Dark Arts☆34Updated 6 years ago
- ☆72Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆33Updated 3 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- ☆67Updated 3 weeks ago