cisagov / RedEyeLinks
RedEye is a visual analytic tool supporting Red & Blue Team operations
☆2,731Updated last year
Alternatives and similar repositories for RedEye
Users that are interested in RedEye are comparing it to the libraries listed below
Sorting:
- You didn't think I'd go and leave the blue team out, right?☆1,675Updated last month
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,191Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,718Updated 2 weeks ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,201Updated last week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,002Updated 7 months ago
- Digging Deeper....☆3,355Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,289Updated 5 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,196Updated 3 months ago
- Incident Response Methodologies 2022☆1,064Updated 3 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,031Updated last month
- Granular, Actionable Adversary Emulation for the Cloud☆2,081Updated 2 weeks ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,174Updated 2 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,141Updated 4 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,781Updated 2 years ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,351Updated 3 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,150Updated 3 weeks ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,642Updated 3 weeks ago
- Collaborative Incident Response platform☆1,214Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,129Updated 8 months ago
- Elastic Security detection content for Endpoint☆1,235Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,859Updated 3 months ago
- Open Adversary Exposure Validation Platform☆1,077Updated last week
- Tools & Interesting Things for RedTeam Ops☆2,207Updated last month
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,480Updated 11 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆981Updated 3 weeks ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,910Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆6,877Updated 4 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,940Updated last month
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆782Updated 2 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,316Updated this week