BlueCyberCat's Stars
rustdesk/rustdesk
An open-source remote desktop application designed for self-hosting, as an alternative to TeamViewer.
onceupon/Bash-Oneliner
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
pixeltris/TwitchAdSolutions
mkaring/ConfuserEx
An open-source, free protector for .NET applications
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
HotCakeX/Harden-Windows-Security
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security levels | Read The Rationale https://github.com/HotCakeX/Harden-Windows-Security/blob/main/Rationale.md
Fadi002/unshackle
Open-source tool to bypass windows and linux passwords from bootable usb
chvancooten/maldev-for-dummies
A workshop about Malware Development
Mazars-Tech/AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
mivano/azure-cost-cli
CLI tool to perform cost analysis on your Azure subscription
bepaald/signalbackup-tools
Tool to work with Signal Backup files.
tclahr/uac
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
securityjoes/MasterParser
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
Cryakl/Ultimate-RAT-Collection
For educational purposes only, samples of 400+ classic/modern trojan builders including screenshots.
iknowjason/PurpleCloud
A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-purple-teaming-183b7df7a2f4
invictus-ir/Microsoft-Extractor-Suite
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
peasead/elastic-container
Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine
maester365/maester
The core repository for the Maester module with helper cmdlets that will be called from the Pester tests.
evild3ad/Microsoft-Analyzer-Suite
A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID
hevnsnt/Awesome_Incident_Response
Awesome Incident Response
ACE-Responder/RogueSliver
A suite of tools to disrupt campaigns using the Sliver C2 framework.
ZeroMemoryEx/C2-Hunter
Extract C2 Traffic
boostsecurityio/poutine
boostsecurityio/poutine
quicaxd/Exela-V2.0
Exela Stealer is an undetectable stealer software at both runtime and scan time. It operates asynchronously, ensuring complete stealth (FUD). It steals passwords, cookies, autofill data, sessions, and tokens. Capable of targeting platforms like Instagram, Twitter, TikTok, Twitch, Spotify, Riot Games, Reddit, Roblox, and Steam
gtworek/VolatileDataCollector
cgosec/Blauhaunt
A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts
Cyb3r-Monk/ACCD
Active C&C Detector
przybylskirobert/ADSecurity
Place where I'm putting all the scripts and config files regarding Active Directory Security.
anvilogic-forge/armory
Anvilogic Forge
darkquasar/AIMOD2
Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proactively identify, engage and prevent cyber threats denying or mitigating potential damage to the organization.