cutaway-security / ROSA_Jumpkit
Remote / Onsite Security Assessment Jumpkit
☆38Updated last year
Alternatives and similar repositories for ROSA_Jumpkit:
Users that are interested in ROSA_Jumpkit are comparing it to the libraries listed below
- Presentation Slides and Resources☆16Updated 9 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 9 years ago
- ☆30Updated 6 years ago
- C# User Simulation☆32Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- ☆11Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- CSIRT Jump Bag☆26Updated 11 months ago
- Site for IWS book content☆18Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- ☆52Updated 6 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- DeTT&CT Editor☆12Updated 3 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago