cutaway-security / ROSA_Jumpkit
Remote / Onsite Security Assessment Jumpkit
☆38Updated last year
Alternatives and similar repositories for ROSA_Jumpkit:
Users that are interested in ROSA_Jumpkit are comparing it to the libraries listed below
- Presentation Slides and Resources☆15Updated 8 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- CSIRT Jump Bag☆27Updated 10 months ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 9 years ago
- ☆30Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- C# User Simulation☆32Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated last month
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Site for IWS book content☆18Updated 6 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- DeTT&CT Editor☆12Updated 2 months ago
- ☆28Updated 8 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- ☆14Updated 6 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆13Updated last month
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆25Updated 4 years ago