blue-team
There are 181 repositories under blue-team topic.
decalage2/awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
Trusted-AI/adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
fabacab/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A-poc/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
cisagov/RedEye
RedEye is a visual analytic tool supporting Red & Blue Team operations
Bashfuscator/Bashfuscator
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
mytechnotalent/Hacking-Windows
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Qianlitp/WatchAD
AD Security Intrusion Detection System
ION28/BLUESPAWN
An Active Defense and EDR software to empower Blue Teams
Viralmaniar/BigBountyRecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
netevert/sentinel-attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
TryCatchHCF/DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Puliczek/awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
satan1a/awesome-cybersecurity-blueteam-cn
网络安全 · 攻防对抗 · 蓝队清单,中文版
atenreiro/opensquat
The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains and brands.
awslabs/aws-cloudsaga
AWS CloudSaga - Simulate security events in AWS
Astrosp/Awesome-OSINT-For-Everything
OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.
dolevf/graphql-cop
Security Auditor Utility for GraphQL APIs
codeexpress/respounder
Respounder detects presence of responder in the network.
joeavanzato/Trawler
PowerShell script to help Incident Responders discover potential adversary persistence mechanisms.
PaperMtn/slack-watchman
Slack enumeration and exposed secrets detection tool
Kirtar22/Litmus_Test
Detecting ATT&CK techniques & tactics for Linux
awslabs/assisted-log-enabler-for-aws
Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
Viralmaniar/Remote-Desktop-Caching-
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
ZeroMemoryEx/Handle-Ripper
Windows handle hijacker
PaperMtn/gitlab-watchman
Finding exposed secrets and personal data in GitLab
AdvDebug/NoMoreCookies
Browser Protector against various stealers, written in C# & C/C++.
softrams/bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
elastic/dorothy
Dorothy is a tool to test security monitoring and detection for Okta environments
oppsec/juumla
🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and sensitive files
KC7-Foundation/kc7
A cybersecurity game in Azure Data Explorer
activecm/rita
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
mytechnotalent/turbo-scanner
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing your own network to ensure there are no malicious services running.
PI-Defender/pi-defender
Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.
pbnj/infosec-interview-questions
🗒️ A [work-in-progress] collection for interview questions for Information Security roles
iknowjason/BlueCloud
Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.