TryCatchHCF / DumpsterFireLinks
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event…
☆1,031Updated 5 years ago
Alternatives and similar repositories for DumpsterFire
Users that are interested in DumpsterFire are comparing it to the libraries listed below
Sorting:
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,310Updated last year
- An information security preparedness tool to do adversarial simulation.☆1,142Updated 6 years ago
- ☆1,093Updated 6 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆728Updated 6 years ago
- A Python Package for Data Exfiltration☆805Updated 6 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆504Updated 3 years ago
- FAME Automates Malware Evaluation☆923Updated last month
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,036Updated 4 years ago
- DejaVU - Open Source Deception Framework☆425Updated 5 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Updated 5 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆458Updated 3 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆485Updated 4 years ago
- Incident Response Methodologies☆1,027Updated 7 years ago
- Online hash checker for Virustotal and other services☆843Updated 10 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆829Updated 8 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆572Updated 6 months ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,304Updated 3 years ago
- Create actionable data from your Vulnerability Scans☆1,396Updated 3 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆469Updated 5 years ago
- A collection of sources of indicators of compromise.☆941Updated 8 months ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,360Updated this week
- ☆202Updated 4 years ago
- Machinae Security Intelligence Collector☆538Updated last year
- Domain Password Audit Tool for Pentesters☆1,017Updated last month
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆648Updated 4 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆614Updated 6 years ago
- A collection of resources for Threat Hunters☆913Updated last year
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆480Updated last year
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,617Updated 2 years ago