-
Updated
Apr 4, 2022 - Python
#
blue-team
Here are 101 public repositories matching this topic...
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
python
machine-learning
privacy
ai
attack
extraction
inference
artificial-intelligence
evasion
red-team
poisoning
adversarial-machine-learning
blue-team
adversarial-examples
adversarial-attacks
trusted-ai
trustworthy-ai
-
Updated
Mar 30, 2022
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Jan 22, 2022
Open
LDAP认证失败
15
An Active Defense and EDR software to empower Blue Teams
-
Updated
Feb 23, 2022 - C++
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
azure
detection
logging
cybersecurity
sysmon
threat-hunting
siem
security-tools
blue-team
mitre-attack
workbooks
sysmon-config
terraform-azure
kql
azure-sentinel
-
Updated
Apr 27, 2021 - HCL
capnspacehook
commented
Jan 15, 2019
Unit tests need to be created that tests obfuscating with all possible Mutator permutations that are 2 Mutators long. So basically given the dozen or so current Mutators, make sure Mutators don't just work on their separately, but together as well. I've run into a few random cases where using Mutators in specific combinations produces faulty payloads, and want a test that can do this for me.
Us
good first issue
Good for newcomers
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
security
automation
hacking
infosec
pentesting
pentest
hacking-tool
red-team
security-tools
pentest-tool
blue-team
hacking-tools
red-teams
blue-teams
pentest-tools
-
Updated
May 27, 2020 - Python
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
osint
cybersecurity
pentesting
recon
bugbounty
offensive-security
red-team
reconnaissance
pentest-tool
blue-team
red-teaming
purple-team
bugbountytips
bugbounty-tool
purple-teams
-
Updated
Jan 29, 2021 - C#
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
training
windows
hack
cplusplus
cpp
assembly
reverse-engineering
assembler
hacking
cybersecurity
ida
ida-pro
cyber
training-materials
win32api
idapro
training-material
blue-team
microsoft-windows
cyber-threat-intelligence
-
Updated
Apr 2, 2022 - C
security
exploit
log4j
cybersecurity
poc
pentesting
writeups
bugbounty
red-team
blue-team
security-writeups
cve-2021-44228
bugbounttips
-
Updated
Mar 22, 2022
Respounder detects presence of responder in the network.
golang
hackers
responder
network-security-monitoring
attack-prevention
llmnr
computer-security
network-security
attack-defense
blue-team
-
Updated
Jun 15, 2019 - Go
网络安全 · 攻防对抗 · 蓝队清单,中文版
-
Updated
Jan 30, 2022 - HTML
AWS CloudSaga - Simulate security events in AWS
-
Updated
Feb 25, 2022 - Python
Detecting ATT&CK techniques & tactics for Linux
incident-response
red-team
blue-team
mitre-attack
defensive-security
security-operations
threathunting
linux-hunting
-
Updated
Oct 1, 2020 - Roff
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
hacking
forensics
penetration-testing
infrastructure-monitoring
forensic-analysis
blueteam
hacking-attack-tools
internal-pentest
redteaming
blue-team
redteam
hacking-tools
purpleteam
forensics-investigations
-
Updated
Aug 4, 2018 - Python
Monitoring your Slack workspaces for sensitive information
slack
tools
monitoring
cybersecurity
infosec
slack-api
red-team
blueteam
blue-team
redteam
purpleteam
purple-team
slack-workspaces
-
Updated
Dec 20, 2021 - Python
Monitoring GitLab for sensitive data shared publicly
gitlab
tools
monitoring
cybersecurity
gitlab-api
infosec
red-team
dlp
blueteam
blue-team
data-loss-prevention
redteam
purpleteam
purple-team
gitlab-watchman
-
Updated
Apr 1, 2022 - Python
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
nodejs
angular
express
typescript
application-security
pentesting
typeorm
bugbounty
appsec
vulnerability-management
vulnerability-assessment
red-team
webappsec
security-tools
vulnerability-report
blue-team
vulnerability-research
security-tool
penetration-testing-tools
-
Updated
Apr 1, 2022 - TypeScript
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
shodan
penetration-testing
exploits
pentesting
scanning
vulnerability-detection
vulnerability-identification
red-team
shodan-api
information-gathering
security-tools
reconnaissance
malware-detection
security-research
blue-team
pre-configure
purple-team
shodan-python
shonydanza
malware-identification
-
Updated
Dec 31, 2021 - Python
Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
-
Updated
Apr 5, 2022 - Python
Dorothy is a tool to test security monitoring and detection for Okta environments
-
Updated
Mar 7, 2022 - Python
The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.
-
Updated
Oct 11, 2017 - Go
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts's ip or fqdn with the sole purpose of testing your own network to ensure there are no malicious services running.
go
golang
security
tcp
malware
tor
cybersecurity
ukraine
russian
port-scanner
malware-analysis
russia
cyber
portscanner
security-tools
tcp-scanner
blue-team
defensive-security
blue-teams
-
Updated
Mar 23, 2022 - Go
-
Updated
Jul 16, 2018
Cloud Incident and Response Simulations
python
aws
security
cloud
incident-response
red-team
incidents
blue-team
cloud-droid
clouddroid
security-incidents-simulation
-
Updated
Mar 10, 2022 - Python
Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
-
Updated
May 27, 2021 - HTML
Improve this page
Add a description, image, and links to the blue-team topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the blue-team topic, visit your repo's landing page and select "manage topics."
WatchAD 和WatchAD-Web的保姆级安装教程: http://bigyoung.cn/blog/posts/23/