geeksniper / Red-team-toolkitLinks
this repo is for red team process and tools collection
☆27Updated 4 years ago
Alternatives and similar repositories for Red-team-toolkit
Users that are interested in Red-team-toolkit are comparing it to the libraries listed below
Sorting:
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Detonate malware on VMs and get logs & detection status☆69Updated 2 weeks ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- General Content☆26Updated 2 weeks ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Yara Rules for Modern Malware☆78Updated last year
- Triaging Windows event logs based on SANS Poster☆41Updated last week
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆31Updated 7 months ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆56Updated last year
- VTC - Velociraptor Timeline Creator☆19Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes☆53Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Detection rule validation☆40Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆73Updated 5 months ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆28Updated 4 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- ☆44Updated 2 weeks ago
- ☆83Updated last year
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- Keep it secret, keep it safe☆79Updated 9 months ago
- ☆20Updated 2 years ago