A curated list of tools and resources that I use daily as a Purple-Team operator.
☆93May 20, 2025Updated 10 months ago
Alternatives and similar repositories for Purple-Team-Resources
Users that are interested in Purple-Team-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆23Jan 23, 2024Updated 2 years ago
- CyberChef update scripts in PowerShell & Bash☆18Apr 22, 2024Updated last year
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆56Feb 9, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- a collection of best pentest resources☆31Feb 4, 2019Updated 7 years ago
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- ☆148Jun 9, 2025Updated 10 months ago
- AI-powered terminal session logger and analyzer. Save a summary of each session and query for it within a catalog 📟🤖☆15Aug 5, 2024Updated last year
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Olger, authomated cybersecurity analyst , check infrastructures and deploy solutions☆14Feb 15, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- A compilation of important commands, files, and tools used in Pentesting☆55Jan 17, 2023Updated 3 years ago
- Here Are Some Bug Bounty Resource From Twitter☆123Feb 18, 2026Updated last month
- Here you can find my found CVEs and Vulnerabilities and how it can help you to learn from it.☆18Feb 18, 2025Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- ☆896Mar 17, 2026Updated 3 weeks ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 5 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- ☆17Jun 15, 2025Updated 9 months ago
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆19Mar 27, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24May 6, 2024Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,315Updated this week
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆80Updated this week
- Educational Satellite for Learning CubeSat☆23Jul 21, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago