ufsitblue / blue
UFSIT scripts and tools for hardening and auditing
☆13Updated 3 weeks ago
Alternatives and similar repositories for blue:
Users that are interested in blue are comparing it to the libraries listed below
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆23Updated 3 weeks ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆14Updated last year
- ☆32Updated 2 years ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆28Updated 5 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆35Updated 3 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 11 months ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- Collection of my own detection rules☆18Updated last year
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆17Updated last year
- ☆37Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 4 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆88Updated 2 months ago
- create a "simulated internet" cyber range environment☆16Updated 3 weeks ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Leverages B64 chunks to split files and save to clipboard☆25Updated 10 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆50Updated last month
- a tiny program to consume from ETW providers for research☆47Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆53Updated 6 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- A user enumeration tool for Slack.☆26Updated 10 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆37Updated 2 months ago
- ☆27Updated 4 months ago
- ☆16Updated 2 months ago