cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,730Updated 2 years ago
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- You didn't think I'd go and leave the blue team out, right?☆1,700Updated 3 weeks ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,033Updated 10 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,345Updated 3 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,200Updated last month
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,445Updated 3 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,045Updated last week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,887Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,517Updated last year
- Collaborative Incident Response platform☆1,304Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,179Updated last month
- Incident Response Methodologies 2022☆1,078Updated 6 months ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,141Updated this week
- Elastic Security detection content for Endpoint☆1,311Updated this week
- Tools and Techniques for Blue Team / Incident Response☆3,428Updated 7 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,930Updated 7 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,255Updated 3 weeks ago
- A list of cyber-chef recipes and curated links☆2,145Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,244Updated this week
- Automating situational awareness for cloud penetration tests.☆2,229Updated this week
- Open Adversarial Exposure Validation Platform☆1,427Updated this week
- Six Degrees of Domain Admin☆2,488Updated this week
- Digging Deeper....☆3,543Updated this week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,138Updated this week
- ThePhish: an automated phishing email analysis tool☆1,287Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Updated 2 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,375Updated 2 weeks ago
- Automated Red Team Infrastructure deployement using Docker☆1,253Updated 3 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,386Updated 11 months ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆773Updated 4 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,096Updated this week