securethelogs / BlueRabbitLinks
Blue Team Powershell Script
☆18Updated 3 years ago
Alternatives and similar repositories for BlueRabbit
Users that are interested in BlueRabbit are comparing it to the libraries listed below
Sorting:
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A toolkit to attack Office365☆16Updated 6 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Virtual Security Operations Center☆51Updated 2 years ago
- ☆15Updated 6 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- ☆29Updated 4 years ago
- ☆21Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- ☆48Updated 8 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 5 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- ☆34Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆12Updated 6 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Commands used in Windows penetration tests☆54Updated 3 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 8 months ago
- ☆47Updated 4 months ago