cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,738Updated 2 years ago
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- You didn't think I'd go and leave the blue team out, right?☆1,727Updated last month
- Digging Deeper....☆3,645Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,413Updated 2 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,044Updated last year
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,971Updated 3 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated 3 weeks ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,482Updated 2 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,058Updated last month
- Six Degrees of Domain Admin☆2,640Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,303Updated 2 weeks ago
- Incident Response Methodologies 2022☆1,091Updated 8 months ago
- Elastic Security detection content for Endpoint☆1,354Updated 3 weeks ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,254Updated last week
- Granular, Actionable Adversary Emulation for the Cloud☆2,218Updated 3 weeks ago
- Collaborative Incident Response platform☆1,340Updated last week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,383Updated 11 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,280Updated last week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,406Updated 2 weeks ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆777Updated 2 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,527Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Updated 3 years ago
- Open EDR public repository☆2,581Updated last year
- Automated Adversary Emulation Platform☆6,638Updated 2 weeks ago
- Open Adversarial Exposure Validation Platform☆1,458Updated this week
- ThePhish: an automated phishing email analysis tool☆1,303Updated last year
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,300Updated 7 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,791Updated 9 months ago
- Automating situational awareness for cloud penetration tests.☆2,261Updated 2 weeks ago
- The Havoc Framework☆8,046Updated 2 weeks ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,345Updated last year