cutaway-security / ROSA_Jumpkit
Remote / Onsite Security Assessment Jumpkit
☆38Updated last year
Alternatives and similar repositories for ROSA_Jumpkit:
Users that are interested in ROSA_Jumpkit are comparing it to the libraries listed below
- Presentation Slides and Resources☆15Updated 7 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- ☆29Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 8 years ago
- DeTT&CT Editor☆12Updated last month
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆22Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- ☆14Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 9 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- ☆11Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆25Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 3 years ago
- Site for IWS book content☆18Updated 6 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Git for me to put all my forensics stuff☆21Updated 2 weeks ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- CSIRT Jump Bag☆27Updated 9 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago