-
Updated
Aug 13, 2021 - Python
#
blue-team
Here are 76 public repositories matching this topic...
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
python
privacy
ai
attack
extraction
inference
artificial-intelligence
evasion
red-team
poisoning
adversarial-machine-learning
blue-team
adversarial-examples
adversarial-attacks
trusted-ai
trustworthy-ai
-
Updated
Aug 14, 2021
Open
LDAP认证失败
15
An Active Defense and EDR software to empower Blue Teams
-
Updated
Apr 29, 2021 - C++
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
security
automation
hacking
infosec
pentesting
pentest
hacking-tool
red-team
security-tools
pentest-tool
blue-team
hacking-tools
red-teams
blue-teams
pentest-tools
-
Updated
May 27, 2020 - Python
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Jun 29, 2021
capnspacehook
commented
Jan 15, 2019
Unit tests need to be created that tests obfuscating with all possible Mutator permutations that are 2 Mutators long. So basically given the dozen or so current Mutators, make sure Mutators don't just work on their separately, but together as well. I've run into a few random cases where using Mutators in specific combinations produces faulty payloads, and want a test that can do this for me.
Us
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
azure
detection
logging
cybersecurity
sysmon
threat-hunting
siem
security-tools
blue-team
mitre-attack
workbooks
sysmon-config
terraform-azure
kql
azure-sentinel
-
Updated
Apr 27, 2021 - HCL
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
osint
cybersecurity
pentesting
recon
bugbounty
offensive-security
red-team
reconnaissance
pentest-tool
blue-team
red-teaming
purple-team
bugbountytips
bugbounty-tool
purple-teams
-
Updated
Jan 29, 2021 - C#
Respounder detects presence of responder in the network.
golang
hackers
responder
network-security-monitoring
attack-prevention
llmnr
computer-security
network-security
attack-defense
blue-team
-
Updated
Jun 15, 2019 - Go
Detecting ATT&CK techniques & tactics for Linux
incident-response
red-team
blue-team
mitre-attack
defensive-security
security-operations
threathunting
linux-hunting
-
Updated
Oct 1, 2020 - Roff
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
hacking
forensics
penetration-testing
infrastructure-monitoring
forensic-analysis
blueteam
hacking-attack-tools
internal-pentest
redteaming
blue-team
redteam
hacking-tools
purpleteam
forensics-investigations
-
Updated
Aug 4, 2018 - Python
Monitoring your Slack workspaces for sensitive information
slack
tools
monitoring
cybersecurity
infosec
slack-api
red-team
blueteam
blue-team
redteam
purpleteam
purple-team
slack-workspaces
-
Updated
Dec 24, 2020 - Python
网络安全 · 攻防对抗 · 蓝队清单,中文版
-
Updated
Jul 23, 2021 - HTML
Monitoring GitLab for sensitive data shared publicly
gitlab
tools
monitoring
cybersecurity
gitlab-api
infosec
red-team
dlp
blueteam
blue-team
data-loss-prevention
redteam
purpleteam
purple-team
gitlab-watchman
-
Updated
Feb 25, 2021 - Python
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
nodejs
angular
express
typescript
application-security
pentesting
typeorm
bugbounty
appsec
vulnerability-management
vulnerability-assessment
red-team
webappsec
security-tools
vulnerability-report
blue-team
vulnerability-research
security-tool
penetration-testing-tools
-
Updated
Aug 13, 2021 - TypeScript
The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.
-
Updated
Oct 11, 2017 - Go
-
Updated
Jul 16, 2018
Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
-
Updated
Aug 13, 2021 - Python
Dorothy is a tool to test security monitoring and detection for Okta environments
-
Updated
Apr 2, 2021 - Python
Cloud Incident and Response Simulations
python
aws
security
cloud
incident-response
red-team
incidents
blue-team
cloud-droid
clouddroid
security-incidents-simulation
-
Updated
Jun 27, 2021 - Python
Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
-
Updated
May 27, 2021 - HTML
Monitoring GitHub for sensitive data shared publicly
github
github-api
tools
monitoring
cybersecurity
infosec
red-team
dlp
blueteam
blue-team
data-loss-prevention
redteam
purpleteam
purple-team
-
Updated
Nov 14, 2020 - Python
Lightweight utility to fool port scanners
protection
fibers
port-scanner
pick
defense
port-scanning
reconnaissance
blue-team
port-scan
closed-ports
-
Updated
Feb 28, 2020 - Crystal
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
shodan
penetration-testing
exploits
pentesting
scanning
vulnerability-detection
vulnerability-identification
red-team
shodan-api
information-gathering
security-tools
reconnaissance
malware-detection
security-research
blue-team
pre-configure
purple-team
shodan-python
shonydanza
malware-identification
-
Updated
Jun 6, 2021 - Python
Collection of PowerShell functinos and scripts a Blue Teamer might use
powershell
cve
defense
dns-over-https
doh
blueteam
blue-team
cve-search
blue-teams
powershell-blue-team
-
Updated
Jul 26, 2021 - PowerShell
Practical Orientation Of MVISION EDR Query Language
-
Updated
May 3, 2020
Improve this page
Add a description, image, and links to the blue-team topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the blue-team topic, visit your repo's landing page and select "manage topics."
WatchAD 和WatchAD-Web的保姆级安装教程: http://bigyoung.cn/blog/posts/23/