There are 59 repositories under blue-team topic.
A collection of awesome security hardening guides, tools and other resources
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Tools and Techniques for Blue Team / Incident Response
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
🦄🔒 Awesome list of secrets in environment variables 🖥️
网络安全 · 攻防对抗 · 蓝队清单,中文版
OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.
AWS CloudSaga - Simulate security events in AWS
Security Auditor Utility for GraphQL APIs
Slack enumeration and exposed secrets detection tool
Respounder detects presence of responder in the network.
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
Detecting ATT&CK techniques & tactics for Linux
Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
simple Windows handle hijacker with a nod to Apxaey for inspiration
Finding exposed secrets and personal data in GitLab
Browser Protector against various stealers, written in C# & C/C++.
A cybersecurity game in Azure Data Explorer
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing your own network to ensure there are no malicious services running.
Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.
🗒️ A [work-in-progress] collection for interview questions for Information Security roles
Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.