cutaway-security / ROSA_JumpkitLinks
Remote / Onsite Security Assessment Jumpkit
☆39Updated last year
Alternatives and similar repositories for ROSA_Jumpkit
Users that are interested in ROSA_Jumpkit are comparing it to the libraries listed below
Sorting:
- Presentation Slides and Resources☆16Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- ☆30Updated 6 years ago
- DeTT&CT Editor☆12Updated last month
- ☆11Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 4 months ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A CALDERA plugin for autonomous incident response☆26Updated last month
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆15Updated 5 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Data related to the SANS Internet Storm Center☆10Updated 6 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- ☆53Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago