geeksniper / Red-team-toolkitLinks
this repo is for red team process and tools collection
☆26Updated 4 years ago
Alternatives and similar repositories for Red-team-toolkit
Users that are interested in Red-team-toolkit are comparing it to the libraries listed below
Sorting:
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- General Content☆26Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated 2 years ago
- Detonate malware on VMs and get logs & detection status☆60Updated last week
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated last month
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- Detection rule validation☆40Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Baseline a Windows System against LOLBAS☆68Updated last year
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆31Updated 7 months ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆31Updated last year
- AutoPoC Generator HoneyPoC☆35Updated 6 months ago
- Evtx Log (xml) Browser☆55Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Yara Rules for Modern Malware☆78Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 10 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆73Updated 4 months ago
- ☆28Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- MS Graph Commands and Tools for Blue Teamers☆51Updated last year
- create a "simulated internet" cyber range environment☆18Updated 5 months ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago