bobbycin / Kali-PurpleLinks
☆53Updated 2 years ago
Alternatives and similar repositories for Kali-Purple
Users that are interested in Kali-Purple are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆411Updated 6 months ago
- ☆64Updated 4 years ago
- CSI SIEM☆110Updated 3 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆280Updated 2 years ago
- Tools for simulating threats☆197Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆191Updated 11 months ago
- God Mode Detection Rules☆134Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆85Updated 4 months ago
- Fast IOC and YARA Scanner☆85Updated 5 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆90Updated last month
- Traps web spiders☆76Updated 5 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Windows Forensics Environment Builder☆167Updated last week
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- A list of resources to build a information security team.☆13Updated 4 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆83Updated 3 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 8 months ago
- InsightVM helpful SQL queries☆76Updated 9 months ago
- Pwnspoof repository☆265Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 6 months ago
- Some Threat Hunting queries useful for blue teamers☆130Updated 3 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆46Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 4 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago