LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 1,506 (+430.28%)
Mutual labels: blueteam, redteam, purpleteam
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-78.87%)
Mutual labels: blueteam, redteam, purpleteam
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (+1241.55%)
Mutual labels: blueteam, redteam, purpleteam
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-72.18%)
Mutual labels: blueteam, redteam, purpleteam
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-78.52%)
Mutual labels: blueteam, redteam, purpleteam
MalwarepersistencescriptsA collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-63.73%)
Mutual labels: blueteam, redteam
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-61.97%)
Mutual labels: blueteam, redteam
Deploy DeceptionA PowerShell module to deploy active directory decoy objects.
Stars: ✭ 109 (-61.62%)
Mutual labels: blueteam, redteam
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-55.28%)
Mutual labels: blueteam, redteam
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-44.01%)
Mutual labels: blueteam, redteam
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-39.79%)
Mutual labels: blueteam, redteam
UltimateapplockerbypasslistThe goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+317.61%)
Mutual labels: blueteam, redteam
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-74.65%)
Mutual labels: blueteam, redteam
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+211.97%)
Mutual labels: blueteam, redteam
MalwlessTest Blue Team detections without running any attack.
Stars: ✭ 215 (-24.3%)
Mutual labels: blueteam, redteam
BlueTeam.LabBlue Team detection lab created with Terraform and Ansible in Azure.
Stars: ✭ 82 (-71.13%)
Mutual labels: blueteam, redteam
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+173.24%)
Mutual labels: blueteam, redteam
SlackpirateSlack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Stars: ✭ 512 (+80.28%)
Mutual labels: blueteam, redteam
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+2074.3%)
Mutual labels: blueteam, redteam
CypherothAutomated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Stars: ✭ 179 (-36.97%)
Mutual labels: blueteam, redteam