The new name is DeTT&CT
☆24Jul 8, 2019Updated 6 years ago
Alternatives and similar repositories for Blue-ATTACK
Users that are interested in Blue-ATTACK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 2 months ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago
- ForGe Forensic test image generator☆34Mar 19, 2015Updated 11 years ago
- This is a list of what I consider F5 LTM iRule development best practices.☆21Jun 5, 2015Updated 10 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 2 months ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Enables you to utilize the Partner Center API to integrate with the Microsoft Identity Management synchronization service.☆13Oct 7, 2016Updated 9 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Aug 8, 2023Updated 2 years ago
- Library of python scripts to apply Data Science in several forensics artifacts☆31Jul 16, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Jupyter demo repository for PancakesCon2020☆16Mar 23, 2020Updated 6 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- study launch anywhere and bundle mismatch bug☆17Apr 23, 2023Updated 2 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 7 months ago
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- ☆18May 23, 2024Updated last year
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- Metasploit Framework☆26Feb 10, 2026Updated last month
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- The Ultimate Software Update Script - Gets software from the source, then packages it for deployment☆17Jan 13, 2016Updated 10 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Feb 15, 2021Updated 5 years ago