Techryptic / Cyber-Defense-Competition-Scripts
Scripts I have made for blue team
☆16Updated 7 years ago
Alternatives and similar repositories for Cyber-Defense-Competition-Scripts:
Users that are interested in Cyber-Defense-Competition-Scripts are comparing it to the libraries listed below
- PowerShell Memory Pulling script☆19Updated 10 years ago
- ☆30Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Git for me to put all my forensics stuff☆21Updated 3 months ago
- ☆21Updated 3 years ago
- Site for IWS book content☆18Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 9 months ago
- OG Atomic Red Team☆29Updated 6 years ago
- Windows stuff☆16Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Updated last year
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago
- ☆12Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- Tools and Binaries to use with KAPE☆12Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago