This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.
☆52Apr 5, 2025Updated 11 months ago
Alternatives and similar repositories for BlueTeam
Users that are interested in BlueTeam are comparing it to the libraries listed below
Sorting:
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆217Apr 5, 2025Updated 11 months ago
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆49Apr 5, 2025Updated 11 months ago
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆53Apr 5, 2025Updated 11 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆57Feb 9, 2024Updated 2 years ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆38Apr 5, 2025Updated 11 months ago
- Clickme is a powerful multi-step clickjacking tool designed for security professionals. Create, visualize, and demonstrate complex clickj…☆14Sep 4, 2025Updated 6 months ago
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated 3 weeks ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆13Jan 9, 2026Updated 2 months ago
- KQL for Azure Resource Manager and AppID search☆23Aug 15, 2024Updated last year
- ☆23Oct 17, 2024Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Dec 23, 2024Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam pr…☆114Feb 26, 2026Updated 3 weeks ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-dept…☆122Feb 8, 2026Updated last month
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- ☆17Jan 20, 2026Updated 2 months ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- ☆10Apr 27, 2025Updated 10 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,736Jan 5, 2026Updated 2 months ago
- ☆18Oct 1, 2025Updated 5 months ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Affiliate Network☆19Aug 30, 2025Updated 6 months ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- DorkStorm is the perfect tool for discovering hidden information on the internet.☆14Feb 23, 2024Updated 2 years ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆19May 25, 2023Updated 2 years ago
- ☆13Apr 15, 2024Updated last year
- Mr. CrackBot AI uses the NVIDIA Jetson Nano 4GB to perform AI-driven penetration testing. It combines GPU-accelerated password cracking w…☆60Dec 24, 2024Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- client & server that can be used to transfer data from a client to a DNS server using DNS only.☆12Mar 30, 2021Updated 4 years ago