cisagov / RedEye
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,712Updated last year
Alternatives and similar repositories for RedEye:
Users that are interested in RedEye are comparing it to the libraries listed below
- You didn't think I'd go and leave the blue team out, right?☆1,651Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,116Updated last month
- A collaborative, multi-platform, red teaming framework☆3,582Updated last week
- Adversary Emulation Framework☆9,210Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,113Updated 2 weeks ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,174Updated 3 months ago
- The Havoc Framework☆7,453Updated 3 months ago
- Automated Adversary Emulation Platform☆6,066Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,103Updated 3 weeks ago
- Digging Deeper....☆3,218Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,776Updated 3 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,081Updated last month
- game of active directory☆6,317Updated last month
- Arsenal is just a quick inventory and launcher for hacking programs☆3,399Updated 4 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,986Updated 4 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,989Updated last week
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,339Updated 3 weeks ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,460Updated this week
- Automation for internal Windows Penetrationtest / AD-Security☆3,476Updated 5 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,569Updated 2 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,275Updated this week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,212Updated 3 months ago
- Interesting APT Report Collection And Some Special IOC☆2,534Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,659Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,560Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,955Updated last week
- Elastic Security detection content for Endpoint☆1,175Updated last week
- A curated list of awesome YARA rules, tools, and people.☆3,775Updated last month
- Tool for Active Directory Certificate Services enumeration and abuse☆2,703Updated 8 months ago
- The Network Execution Tool☆4,056Updated last week