cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,739Updated 2 years ago
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- You didn't think I'd go and leave the blue team out, right?☆1,730Updated last month
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,438Updated 3 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,049Updated last year
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,014Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,207Updated last week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,433Updated this week
- Incident Response Methodologies 2022☆1,101Updated 9 months ago
- Digging Deeper....☆3,747Updated this week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,062Updated last week
- Elastic Security detection content for Endpoint☆1,372Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,311Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,334Updated last week
- Collaborative Incident Response platform☆1,381Updated 2 weeks ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,531Updated 3 weeks ago
- Open Adversarial Exposure Validation Platform☆1,609Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,068Updated 8 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,538Updated last year
- ThePhish: an automated phishing email analysis tool☆1,324Updated last year
- Tools and Techniques for Blue Team / Incident Response☆3,916Updated 10 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,921Updated 3 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,290Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆3,142Updated 10 months ago
- Automated Adversary Emulation Platform☆6,733Updated this week
- A list of cyber-chef recipes and curated links☆2,183Updated last year
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆1,000Updated 5 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,782Updated 3 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 3 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆703Updated 9 months ago
- BlueHound - pinpoint the security issues that actually matter☆760Updated 2 years ago