A curated list of tools and resources that I use daily as a Purple-Team operator.
☆98May 20, 2025Updated 11 months ago
Alternatives and similar repositories for Purple-Team-Resources
Users that are interested in Purple-Team-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Configurations to implement Wazuh☆13Nov 28, 2022Updated 3 years ago
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆23Jan 23, 2024Updated 2 years ago
- CyberChef update scripts in PowerShell & Bash☆19Apr 22, 2024Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆58Feb 9, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Detection rule validation☆41Oct 25, 2023Updated 2 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Jun 14, 2023Updated 2 years ago
- Purple Team Strategies, Published by Packt☆16Apr 22, 2026Updated last week
- ☆149Jun 9, 2025Updated 10 months ago
- OSINT Tool for Nigerian Phone Numbers☆20Jul 7, 2020Updated 5 years ago
- AI-powered terminal session logger and analyzer. Save a summary of each session and query for it within a catalog 📟🤖☆16Aug 5, 2024Updated last year
- Installs ADDS and configures a vulnerable domain via a powershell script☆15Jul 13, 2023Updated 2 years ago
- OllaDeck is a purple technology stack for Generative AI (text modality) cybersecurity. It provides a comprehensive set of tools for both …☆17Sep 21, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 4 months ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- ☆903Mar 17, 2026Updated last month
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆69Sep 13, 2023Updated 2 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 6 years ago
- A compilation of important commands, files, and tools used in Pentesting☆56Jan 17, 2023Updated 3 years ago
- Here Are Some Bug Bounty Resource From Twitter☆129Feb 18, 2026Updated 2 months ago
- Here you can find my found CVEs and Vulnerabilities and how it can help you to learn from it.☆18Feb 18, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- All around cracking wordlist.☆31Oct 25, 2023Updated 2 years ago
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆22Feb 11, 2025Updated last year
- ☆43Apr 26, 2025Updated last year
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 4 months ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 5 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Write-ups of All types Bugs☆21Apr 13, 2022Updated 4 years ago
- ☆17Jun 15, 2025Updated 10 months ago
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year