A curated list of tools and resources that I use daily as a Purple-Team operator.
☆95May 20, 2025Updated 9 months ago
Alternatives and similar repositories for Purple-Team-Resources
Users that are interested in Purple-Team-Resources are comparing it to the libraries listed below
Sorting:
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- a collection of best pentest resources☆29Feb 4, 2019Updated 7 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Olger, authomated cybersecurity analyst , check infrastructures and deploy solutions☆14Feb 15, 2023Updated 3 years ago
- ☆146Jun 9, 2025Updated 9 months ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- AI-powered terminal session logger and analyzer. Save a summary of each session and query for it within a catalog 📟🤖☆14Aug 5, 2024Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆55Feb 23, 2026Updated 2 weeks ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 2 months ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated 3 weeks ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆132May 13, 2022Updated 3 years ago
- ☆81May 27, 2023Updated 2 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- Write-ups of All types Bugs☆21Apr 13, 2022Updated 3 years ago
- ☆25Nov 24, 2025Updated 3 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- How to Crack an Entry Level Job in Cybersecurity! - 2024☆21Apr 5, 2024Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆667Jun 14, 2023Updated 2 years ago