cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,735Updated 2 years ago
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,399Updated 2 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,041Updated last year
- You didn't think I'd go and leave the blue team out, right?☆1,706Updated last week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,954Updated last week
- Digging Deeper....☆3,621Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,211Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated last week
- Automating situational awareness for cloud penetration tests.☆2,254Updated last month
- Six Degrees of Domain Admin☆2,601Updated this week
- Collaborative Incident Response platform☆1,322Updated 3 weeks ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,396Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,524Updated last year
- Incident Response Methodologies 2022☆1,088Updated 8 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,472Updated last month
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,699Updated 2 months ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,022Updated last month
- ThePhish: an automated phishing email analysis tool☆1,294Updated last year
- Elastic Security detection content for Endpoint☆1,338Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,273Updated 2 weeks ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,230Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,038Updated 6 months ago
- BlueHound - pinpoint the security issues that actually matter☆754Updated 2 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,625Updated last year
- A list of cyber-chef recipes and curated links☆2,150Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,288Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,025Updated last month
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Updated 2 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,120Updated this week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,054Updated last week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Updated 2 years ago