cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,731Updated last year
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,025Updated 9 months ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,830Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,282Updated last month
- You didn't think I'd go and leave the blue team out, right?☆1,691Updated last week
- Digging Deeper....☆3,466Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,198Updated 3 months ago
- Incident Response Methodologies 2022☆1,069Updated 5 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,158Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,408Updated last month
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,044Updated last week
- Tools and Techniques for Blue Team / Incident Response☆3,328Updated 5 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,218Updated this week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,350Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,504Updated last year
- ThePhish: an automated phishing email analysis tool☆1,268Updated last year
- A list of cyber-chef recipes and curated links☆2,131Updated last year
- Elastic Security detection content for Endpoint☆1,286Updated this week
- BlueHound - pinpoint the security issues that actually matter☆746Updated 2 years ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆1,972Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,216Updated last week
- Open Adversary Exposure Validation Platform☆1,396Updated this week
- Collaborative Incident Response platform☆1,262Updated this week
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆783Updated 2 years ago
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,086Updated last year
- Automating situational awareness for cloud penetration tests.☆2,195Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,144Updated 10 months ago
- Tools and Techniques for Red Team / Penetration Testing☆7,294Updated 6 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,835Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,986Updated 3 months ago
- Cybersecurity Evaluation Tool☆1,675Updated this week