dante-falls / Purple-SharkLinks
A Bash Script that parses through a PCAP file and automatically outputs valuable information about the Network Traffic.
☆12Updated last year
Alternatives and similar repositories for Purple-Shark
Users that are interested in Purple-Shark are comparing it to the libraries listed below
Sorting:
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Updated 2 weeks ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆36Updated 5 months ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆13Updated 7 months ago
- A list of awesome penetration testing tools and resources.☆81Updated last year
- Resources for AD penetration testing and security☆32Updated 3 years ago
- ☆32Updated 2 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated 8 months ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆58Updated 10 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 4 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆33Updated 11 months ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆16Updated 3 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated 11 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆48Updated last year
- InfoSec Notes☆56Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago
- My Favorite Offensive Security Scripts☆73Updated 2 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆40Updated 6 months ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- ☆44Updated 2 weeks ago
- DEFCON 31 slide deck and video link☆63Updated 3 weeks ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- ☆33Updated last year
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Updated 9 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 11 months ago