TryCatchHCF / DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event…
☆1,010Updated 4 years ago
Alternatives and similar repositories for DumpsterFire:
Users that are interested in DumpsterFire are comparing it to the libraries listed below
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,267Updated 2 months ago
- An information security preparedness tool to do adversarial simulation.☆1,120Updated 6 years ago
- ☆1,070Updated 5 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- FAME Automates Malware Evaluation☆889Updated 3 weeks ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,211Updated 4 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- Utilities for MITRE™ ATT&CK☆1,025Updated 10 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,564Updated last year
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆480Updated 4 years ago
- Incident Response Methodologies☆1,024Updated 6 years ago
- A Python Package for Data Exfiltration☆782Updated 11 months ago
- A collection of resources for Threat Hunters☆880Updated 6 months ago
- Create actionable data from your Vulnerability Scans☆1,377Updated 2 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆446Updated 3 years ago
- A collection of sources of indicators of compromise.☆849Updated 6 months ago
- Extract and aggregate threat intelligence.☆856Updated last year
- Configuration files for the SOF-ELK VM☆1,578Updated 2 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,602Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,766Updated 3 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆597Updated 5 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,444Updated 2 months ago
- A Powershell incident response framework☆1,594Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆498Updated 7 months ago
- Online hash checker for Virustotal and other services☆824Updated 3 weeks ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,149Updated last year