cisagov / RedEye
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,711Updated last year
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,135Updated 3 weeks ago
- The Havoc Framework☆7,532Updated 3 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,988Updated 5 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,658Updated last year
- Tools and Techniques for Blue Team / Incident Response☆3,106Updated last month
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,194Updated 3 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,693Updated 2 months ago
- Tools & Interesting Things for RedTeam Ops☆2,192Updated 2 years ago
- Digging Deeper....☆3,252Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,792Updated last month
- A collaborative, multi-platform, red teaming framework☆3,632Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,534Updated this week
- Adversary Emulation Framework☆9,344Updated this week
- The Network Execution Tool☆4,166Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,604Updated 3 weeks ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,442Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,967Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,814Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆3,486Updated 5 months ago
- Elastic Security detection content for Endpoint☆1,193Updated last week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,595Updated 3 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,104Updated 2 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,767Updated 2 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,415Updated 5 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,886Updated last year
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,361Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,688Updated 8 months ago
- game of active directory☆6,376Updated 2 months ago
- Pentest Report Generator☆2,516Updated 2 weeks ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,885Updated 10 months ago