BrAmaral / Purple-Team-ResourcesView external linksLinks
A curated list of tools and resources that I use daily as a Purple-Team operator.
☆94May 20, 2025Updated 8 months ago
Alternatives and similar repositories for Purple-Team-Resources
Users that are interested in Purple-Team-Resources are comparing it to the libraries listed below
Sorting:
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated this week
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 9 months ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- Olger, authomated cybersecurity analyst , check infrastructures and deploy solutions☆14Feb 15, 2023Updated 3 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- ☆144Jun 9, 2025Updated 8 months ago
- Automated Cloud Misconfiguration Testing☆23Jun 20, 2025Updated 7 months ago
- Educational Satellite for Learning CubeSat☆20Jul 21, 2023Updated 2 years ago
- AI-powered terminal session logger and analyzer. Save a summary of each session and query for it within a catalog 📟🤖☆14Aug 5, 2024Updated last year
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- CyberChef update scripts in PowerShell & Bash☆17Apr 22, 2024Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated last month
- OSINT Tool for Nigerian Phone Numbers☆20Jul 7, 2020Updated 5 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Jan 22, 2025Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 4 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 9 months ago
- Collection of scripts to automate the Malware Analysis process☆32Oct 27, 2025Updated 3 months ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 2 months ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆56Updated this week
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Sep 8, 2025Updated 5 months ago
- Here you can find my found CVEs and Vulnerabilities and how it can help you to learn from it.☆18Feb 18, 2025Updated 11 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- ☆43Apr 26, 2025Updated 9 months ago
- Some Threat Hunting queries useful for blue teamers☆132May 13, 2022Updated 3 years ago
- command control framework☆30Updated this week