blacklanternsecurity / bls-bible
BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.
☆27Updated last year
Alternatives and similar repositories for bls-bible:
Users that are interested in bls-bible are comparing it to the libraries listed below
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- ☆18Updated last year
- ☆41Updated 2 years ago
- ☆20Updated last year
- ☆46Updated 2 months ago
- ☆32Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- ☆34Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated last month
- Resources for AD penetration testing and security☆29Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- ☆34Updated 11 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆54Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- ☆63Updated 3 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated 2 weeks ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year