There are 81 repositories under blueteam topic.
E-mails, subdomains and names Harvester - OSINT
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
A collection of awesome security hardening guides, tools and other resources
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Rapidly Search and Hunt through Windows Forensic Artefacts
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
Tools and Techniques for Blue Team / Incident Response
HardeningKitty and Windows Hardening settings and configurations
红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
The goal of this repository is to document the most common techniques to bypass AppLocker.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
You didn't think I'd go and leave the blue team out, right?
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
HardeningKitty - Checks and hardens your Windows configuration
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Active Directory data collector for BloodHound written in Rust. 🦀
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Hunting queries and detections
Scan your code for security misconfiguration, search for passwords and secrets. :mag:
Purple Team Exercise Framework
A tool that shows detailed information about named pipes in Windows