This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.
☆52Apr 5, 2025Updated last year
Alternatives and similar repositories for BlueTeam
Users that are interested in BlueTeam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆219Apr 5, 2025Updated last year
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆49Apr 5, 2025Updated last year
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆53Apr 5, 2025Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆56Feb 9, 2024Updated 2 years ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆39Apr 5, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Performing website vulnerability scanning using OpenAI technologie☆67Apr 5, 2025Updated last year
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆13Jan 9, 2026Updated 3 months ago
- WatchTower - A platform to save your valuable time while staying updated in the Cyber realm.☆18Dec 31, 2025Updated 3 months ago
- Sysmon Config Pusher - Modernized☆37Jan 7, 2026Updated 3 months ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 6 months ago
- A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or…☆1,240Apr 5, 2025Updated last year
- https://25daysofserverless.com/ challenges☆10May 31, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆19Mar 27, 2024Updated 2 years ago
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆44Updated this week
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆115Mar 3, 2026Updated last month
- ☆13Sep 7, 2023Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆13Sep 25, 2024Updated last year
- The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-dept…☆122Feb 8, 2026Updated 2 months ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- ☆18Jan 20, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- ☆10Apr 27, 2025Updated 11 months ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- You didn't think I'd go and leave the blue team out, right?☆1,738Mar 27, 2026Updated last week
- ☆18Oct 1, 2025Updated 6 months ago
- Affiliate Network☆18Aug 30, 2025Updated 7 months ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 3 months ago
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆19May 25, 2023Updated 2 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆15Aug 22, 2022Updated 3 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- ☆13Apr 15, 2024Updated last year
- ☆362Mar 14, 2026Updated 3 weeks ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago