unix-ninja / redteamnotebook
An experiment to address digital intelligence archiving on offensive engagements.
☆25Updated 4 years ago
Alternatives and similar repositories for redteamnotebook:
Users that are interested in redteamnotebook are comparing it to the libraries listed below
- wordlists for password cracking☆26Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 7 years ago
- Hashes of infamous malware☆25Updated last year
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- ☆22Updated 4 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆14Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 7 months ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆16Updated 2 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆13Updated last month
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 3 weeks ago