A curated list of tools and resources that I use daily as a Purple-Team operator.
☆100May 1, 2026Updated 2 weeks ago
Alternatives and similar repositories for Purple-Team-Resources
Users that are interested in Purple-Team-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated last year
- Configurations to implement Wazuh☆13Nov 28, 2022Updated 3 years ago
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆23Jan 23, 2024Updated 2 years ago
- CyberChef update scripts in PowerShell & Bash☆19Apr 22, 2024Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆58Feb 9, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Detection rule validation☆41Oct 25, 2023Updated 2 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Jun 14, 2023Updated 2 years ago
- a collection of best pentest resources☆34Feb 4, 2019Updated 7 years ago
- Purple Team Strategies, Published by Packt☆16Apr 22, 2026Updated 3 weeks ago
- ☆149Jun 9, 2025Updated 11 months ago
- AI-powered terminal session logger and analyzer. Save a summary of each session and query for it within a catalog 📟🤖☆16Aug 5, 2024Updated last year
- Installs ADDS and configures a vulnerable domain via a powershell script☆15Jul 13, 2023Updated 2 years ago
- OllaDeck is a purple technology stack for Generative AI (text modality) cybersecurity. It provides a comprehensive set of tools for both …☆17Sep 21, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 4 months ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- ☆907Mar 17, 2026Updated 2 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆69Sep 13, 2023Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆56Jan 17, 2023Updated 3 years ago
- Here you can find my found CVEs and Vulnerabilities and how it can help you to learn from it.☆18Feb 18, 2025Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆23Feb 11, 2025Updated last year
- ☆43Apr 26, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 11 months ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 5 months ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 6 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Write-ups of All types Bugs☆22Apr 13, 2022Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆63Oct 29, 2024Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated 2 years ago
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆37Sep 30, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Jul 6, 2024Updated last year