cutaway-security / ROSA_JumpkitLinks
Remote / Onsite Security Assessment Jumpkit
☆38Updated last year
Alternatives and similar repositories for ROSA_Jumpkit
Users that are interested in ROSA_Jumpkit are comparing it to the libraries listed below
Sorting:
- Presentation Slides and Resources☆16Updated 11 months ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 6 years ago
- ☆30Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- ☆11Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- DeTT&CT Editor☆12Updated 3 weeks ago
- ☆53Updated 7 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 10 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago