There are 3 repositories under blueteaming topic.
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can generate reports.
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Repository with Sample KQL Query examples for Threat Hunting
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.
APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can collect and analyse data from these indexed pastesites to better protect against unknown threats.
List of sources for cybersecurity news
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool
Actionable analytics designed to combat threats based on MITRE's ATT&CK.
A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.
BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detections via yaml files
Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.
OllaDeck is a purple technology stack for Generative AI (text modality) cybersecurity. It provides a comprehensive set of tools for both blue team and red team operations in the context of text-based generative AI.
A user-friendly and powerful tool to analyze Windows Security Events
Triage an IP using powershell
BasicEventViewer (BEV v3.0), this code will useful for All Blue Teamers.
This Code is just lists the updated vulnerablities and cves in the version of some services like ftp,http and more
systeminfo command for offline system images
PyCanary: CMD line tool to monitor any directory for file access or file changes, log event, send basic alert to user, and dump and process information collected. There is also a background thread monitoring all created processes and logging them for later analysis.