punk-security / pwnspoof
Pwnspoof repository
☆261Updated last year
Alternatives and similar repositories for pwnspoof
Users that are interested in pwnspoof are comparing it to the libraries listed below
Sorting:
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆287Updated last week
- Repository resource for threat hunter☆158Updated 6 years ago
- Some Threat Hunting queries useful for blue teamers☆126Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆152Updated 5 months ago
- Jupyter Notebooks for the Blue Team☆144Updated last month
- Useful resources about phishing email analysis☆83Updated 3 months ago
- Incident Response collection and processing scripts with automated reporting scripts☆299Updated 10 months ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆251Updated this week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆615Updated 10 months ago
- Tools for simulating threats☆183Updated last year
- MISP Playbooks☆199Updated 3 months ago
- ☆160Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆114Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- Resources To Learn And Understand SIGMA Rules☆175Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 2 weeks ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 2 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Atomic Purple Team Framework and Lifecycle☆294Updated 4 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆651Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 2 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- An open-source self-hosted purple team management web application.☆269Updated last week
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆464Updated 10 months ago