bobbycin / Kali-PurpleLinks
☆53Updated 2 years ago
Alternatives and similar repositories for Kali-Purple
Users that are interested in Kali-Purple are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- Traps web spiders☆75Updated 5 years ago
- God Mode Detection Rules☆134Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- CSI SIEM☆110Updated 2 years ago
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 8 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 9 months ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆41Updated last year
- ☆62Updated 4 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆403Updated 4 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 5 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Knowledge base on cybercriminal concealment techniques☆76Updated 4 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆85Updated last month
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆132Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆103Updated last year
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆80Updated last month
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆229Updated 11 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆167Updated 3 weeks ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆273Updated last year
- Pwnspoof repository☆264Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆128Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆40Updated 4 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 2 weeks ago
- ☆135Updated last year