cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,731Updated last year
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- You didn't think I'd go and leave the blue team out, right?☆1,696Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,315Updated this week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,025Updated 9 months ago
- Digging Deeper....☆3,473Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,199Updated 2 weeks ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,857Updated 2 weeks ago
- Incident Response Methodologies 2022☆1,073Updated 5 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,044Updated last week
- Tools and Techniques for Blue Team / Incident Response☆3,355Updated 6 months ago
- Automating situational awareness for cloud penetration tests.☆2,208Updated last week
- Collaborative Incident Response platform☆1,285Updated this week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,360Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,165Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,241Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,231Updated 2 weeks ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,998Updated 4 months ago
- Elastic Security detection content for Endpoint☆1,300Updated 2 weeks ago
- Open Adversary Exposure Validation Platform☆1,408Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,509Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,787Updated 2 years ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,383Updated 3 months ago
- A list of cyber-chef recipes and curated links☆2,137Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,155Updated this week
- Offensive Software Exploitation Course☆2,384Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,921Updated 2 years ago
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,086Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,112Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,922Updated 6 months ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆1,978Updated this week
- BlueHound - pinpoint the security issues that actually matter☆748Updated 2 years ago