Trending repositories for topic blueteam
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
Rapidly Search and Hunt through Windows Forensic Artefacts
🕵️♂️ Collect a dossier on a person by username from thousands of sites
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
A collection of awesome security hardening guides, tools and other resources
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Rapidly Search and Hunt through Windows Forensic Artefacts
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
HardeningKitty - Checks and hardens your Windows configuration
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
🕵️♂️ Collect a dossier on a person by username from thousands of sites
A collection of awesome security hardening guides, tools and other resources
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
🕵️♂️ Collect a dossier on a person by username from thousands of sites
Rapidly Search and Hunt through Windows Forensic Artefacts
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
A collection of awesome security hardening guides, tools and other resources
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
Investigate malicious Windows logon by visualizing and analyzing Windows event log
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
Rapidly Search and Hunt through Windows Forensic Artefacts
TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。
Hourly updated database of exploit and exploitation reports
HardeningKitty - Checks and hardens your Windows configuration
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
🕵️♂️ Collect a dossier on a person by username from thousands of sites
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Rapidly Search and Hunt through Windows Forensic Artefacts
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
A collection of awesome security hardening guides, tools and other resources
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。
🕵️♂️ Collect a dossier on a person by username from thousands of sites
This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.
Rapidly Search and Hunt through Windows Forensic Artefacts
Purpleteam scripts simulation & Detection - trigger events for SOC detections
yara detection rules for hunting with the threathunting-keywords project
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
🕵️♂️ Collect a dossier on a person by username from thousands of sites
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
A collection of awesome security hardening guides, tools and other resources
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Rapidly Search and Hunt through Windows Forensic Artefacts
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
HardeningKitty - Checks and hardens your Windows configuration
yara detection rules for hunting with the threathunting-keywords project
This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.
A curated list of tools and resources that I use daily as a Purple-Team operator.
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
This repository stores various roadmap(Mindmaps) for bug bounty Hunter, pentester, offensive(red team), defensive(blue team) and security Professional people
The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
Awesome list of keywords and artifacts for Threat Hunting sessions
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
Purpleteam scripts simulation & Detection - trigger events for SOC detections
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Sigma detection rules for hunting with the threathunting-keywords project
🕵️♂️ Collect a dossier on a person by username from thousands of sites
Hourly updated database of exploit and exploitation reports
Detect real scammers with Wallet-Tracker CLI from anywhere.