bobbycin / Kali-PurpleLinks
☆52Updated 2 years ago
Alternatives and similar repositories for Kali-Purple
Users that are interested in Kali-Purple are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆98Updated 11 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated 2 years ago
- CSI SIEM☆110Updated 2 years ago
- ☆60Updated 4 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆81Updated 3 weeks ago
- God Mode Detection Rules☆134Updated 11 months ago
- Fast IOC and YARA Scanner☆80Updated 5 years ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆41Updated last year
- Tools for simulating threats☆188Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆87Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆39Updated 4 years ago
- a curated, categorised collection of useful projects 👨👩👧☆113Updated 2 weeks ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆228Updated 9 months ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- Useful resources about phishing email analysis☆84Updated 5 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆77Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated last month
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 3 months ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- ☆47Updated 2 years ago
- InsightVM helpful SQL queries☆65Updated 5 months ago
- Pwnspoof repository☆262Updated last year
- Creation of a laboratory for malware analysis in AWS☆101Updated 2 years ago
- Security Operations Chef☆36Updated last month
- A list of resources to build a information security team.☆13Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 9 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆155Updated last year