Statistics for topic blueteam
RepositoryStats tracks 518,986 Github repositories, of these 111 are tagged with the blueteam topic. The most common primary language for repositories using this topic is Python (30). Other languages include: C# (11), PowerShell (11)
Stargazers over time for topic blueteam
Most starred repositories for topic blueteam (view more)
Trending repositories for topic blueteam (view more)
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
A collection of awesome security hardening guides, tools and other resources
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
You didn't think I'd go and leave the blue team out, right?
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
yara detection rules for hunting with the threathunting-keywords project
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
Awesome list of keywords and artifacts for Threat Hunting sessions
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
yara detection rules for hunting with the threathunting-keywords project
The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
yara detection rules for hunting with the threathunting-keywords project
A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting to scan multiple bug bounty programs simultaneously, on a recurr...
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Awesome list of keywords and artifacts for Threat Hunting sessions
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Sigma detection rules for hunting with the threathunting-keywords project