securethelogs / BlueRabbit
Blue Team Powershell Script
☆18Updated 3 years ago
Alternatives and similar repositories for BlueRabbit:
Users that are interested in BlueRabbit are comparing it to the libraries listed below
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆24Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- The New Hacking Framework☆18Updated 7 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- My Python Cookiecutter project template☆30Updated 2 years ago
- Custom pentesting tools☆24Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- ☆15Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ☆34Updated last month
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- THOR APT Scanner User Manual☆18Updated last week
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago