bobbycin / Kali-PurpleLinks
☆53Updated 3 years ago
Alternatives and similar repositories for Kali-Purple
Users that are interested in Kali-Purple are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- ☆67Updated 4 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆415Updated 8 months ago
- Tools for simulating threats☆199Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- A list of resources to build a information security team.☆13Updated 5 years ago
- God Mode Detection Rules☆135Updated last year
- Traps web spiders☆79Updated 5 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Fast IOC and YARA Scanner☆89Updated 5 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 10 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- Security Operations Chef☆56Updated 3 weeks ago
- CSI SIEM☆109Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- a curated, categorised collection of useful projects 👨👩👧☆127Updated last week
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆262Updated 3 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆122Updated 8 months ago
- Search a filesystem for indicators of compromise (IoC).☆83Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆147Updated last week
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆42Updated 2 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆95Updated last month
- an awesome list of active defense resources☆129Updated 5 years ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆87Updated 6 months ago
- Conference presentations☆60Updated 3 months ago
- Creation of a laboratory for malware analysis in AWS☆106Updated 3 years ago