cisagov / RedEye
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,682Updated last year
Alternatives and similar repositories for RedEye:
Users that are interested in RedEye are comparing it to the libraries listed below
- Automated Adversary Emulation Platform☆5,786Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,022Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,408Updated last week
- Tools and Techniques for Blue Team / Incident Response☆2,901Updated 9 months ago
- Cybersecurity Evaluation Tool☆1,487Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,070Updated last month
- Digging Deeper....☆3,058Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆1,884Updated this week
- Adversary Emulation Framework☆8,782Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,996Updated 2 weeks ago
- Automating situational awareness for cloud penetration tests.☆1,998Updated 2 weeks ago
- You didn't think I'd go and leave the blue team out, right?☆1,631Updated last year
- Open Cyber Threat Intelligence Platform☆6,644Updated this week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,942Updated last month
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,774Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,732Updated 2 years ago
- The Havoc Framework☆7,085Updated this week
- Tools & Interesting Things for RedTeam Ops☆2,165Updated 2 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,258Updated last month
- Offensive Software Exploitation Course☆2,354Updated last year
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,402Updated this week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,197Updated last week
- Open EDR public repository☆2,324Updated last year
- The Network Execution Tool☆3,487Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,040Updated this week
- Tools and Techniques for Red Team / Penetration Testing☆6,217Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,057Updated this week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆3,961Updated 6 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,095Updated 5 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,507Updated 6 months ago