ch33r10 / EnterprisePurpleTeamingLinks
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
☆656Updated 2 years ago
Alternatives and similar repositories for EnterprisePurpleTeaming
Users that are interested in EnterprisePurpleTeaming are comparing it to the libraries listed below
Sorting:
- Purple Team Exercise Framework☆721Updated last year
- Practical Windows Forensics Training☆670Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆620Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆482Updated 7 months ago
- Bloodhound Reporting for Blue and Purple Teams☆1,209Updated 4 months ago
- Course repository for PowerShell for Pentesters Course☆432Updated 3 years ago
- ☆615Updated 2 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆526Updated 2 years ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆580Updated 3 months ago
- BlueHound - pinpoint the security issues that actually matter☆738Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆737Updated 4 months ago
- Atomic Purple Team Framework and Lifecycle☆299Updated 4 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Red Team Attack Lab for TTP testing & research☆576Updated 2 years ago
- Ransomware simulator written in Golang☆440Updated 3 years ago
- Pwnspoof repository☆262Updated last year
- Documentation and scripts to properly enable Windows event logs.☆620Updated last year
- Indexes for SANS Courses and GIAC Certifications☆253Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆853Updated 3 years ago
- Incident Response Methodologies 2022☆1,063Updated 3 months ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆477Updated 2 months ago
- ☆774Updated last week
- MAL-CL (Malicious Command-Line)☆314Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆581Updated 5 months ago
- ☆515Updated 9 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,142Updated this week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,489Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆585Updated last week
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆788Updated 2 years ago
- SMBeagle - Fileshare auditing tool.☆717Updated 5 months ago