bobbycin / Kali-PurpleLinks
☆51Updated 2 years ago
Alternatives and similar repositories for Kali-Purple
Users that are interested in Kali-Purple are comparing it to the libraries listed below
Sorting:
- ☆60Updated 4 years ago
- Tools for simulating threats☆186Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- God Mode Detection Rules☆134Updated 10 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆98Updated 11 months ago
- ☆46Updated 2 years ago
- InsightVM helpful SQL queries☆65Updated 4 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆76Updated last year
- Traps web spiders☆75Updated 5 years ago
- CSI SIEM☆110Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆321Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆143Updated 2 weeks ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- Security Operations Chef☆35Updated last week
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 3 weeks ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated 2 weeks ago
- Windows Forensics Environment Builder☆150Updated last week
- Knowledge base on cybercriminal concealment techniques☆72Updated last month
- Windows Malware Investigation Scripts & Docs☆83Updated 7 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆117Updated 2 years ago
- Fast IOC and YARA Scanner☆80Updated 5 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Useful resources about phishing email analysis☆84Updated 4 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆168Updated 2 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆160Updated 7 months ago