cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,739Updated 2 years ago
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- You didn't think I'd go and leave the blue team out, right?☆1,728Updated 3 weeks ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,433Updated 3 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated last week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,996Updated this week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,045Updated last year
- Digging Deeper....☆3,710Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,516Updated last week
- Incident Response Methodologies 2022☆1,100Updated 9 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,299Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,529Updated last year
- Collaborative Incident Response platform☆1,367Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,402Updated 7 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,226Updated last week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,062Updated 2 weeks ago
- Cybersecurity Evaluation Tool☆1,754Updated this week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,421Updated this week
- ThePhish: an automated phishing email analysis tool☆1,314Updated last year
- Tools and Techniques for Blue Team / Incident Response☆3,885Updated 9 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,059Updated 7 months ago
- Tools & Interesting Things for RedTeam Ops☆2,244Updated 7 months ago
- Elastic Security detection content for Endpoint☆1,365Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,920Updated this week
- Automated Adversary Emulation Platform☆6,682Updated last week
- BlueHound - pinpoint the security issues that actually matter☆756Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆861Updated 4 years ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,310Updated this week
- Open EDR public repository☆2,594Updated 2 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Updated 3 years ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,357Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,608Updated this week