ufsitblue / blueLinks
UFSIT scripts and tools for hardening and auditing
☆13Updated last week
Alternatives and similar repositories for blue
Users that are interested in blue are comparing it to the libraries listed below
Sorting:
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 4 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆14Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 10 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆43Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 3 months ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆37Updated 4 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆24Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- runs sliver command on all hosts, partially based on example in sliver repo☆13Updated last year
- ☆37Updated last year
- A simple Python script to do quick, targeted recon of a given domain.☆15Updated last month
- create a "simulated internet" cyber range environment☆16Updated last week
- ☆80Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 11 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆60Updated 6 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 2 months ago
- The source code of the DEF CON Red Team Offense Village website☆9Updated last month
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Lena's scripts/code/resources for malware analysis☆27Updated 11 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- ☆24Updated 3 months ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- ☆12Updated last year
- Yet another shellcode loader - but a sneaky one☆20Updated last month
- Persist like a Dodder☆61Updated 2 weeks ago
- ☆17Updated 7 months ago
- Quick ESXi Log Parser☆21Updated 5 months ago