☆42Mar 6, 2023Updated 3 years ago
Alternatives and similar repositories for Blue-Team-Community
Users that are interested in Blue-Team-Community are comparing it to the libraries listed below
Sorting:
- ☆195Mar 11, 2024Updated 2 years ago
- Cybersecurity Black Friday Deals repository! 🛡️🎁☆44Nov 23, 2023Updated 2 years ago
- SOC Interview Questions☆1,271Sep 10, 2024Updated last year
- Learn AWS Security by Example☆22Apr 20, 2022Updated 3 years ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆902Aug 28, 2023Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Bu bir not defteri programıdır. Sayfalar halinde not tutmanızı sağlar ve sadece Linux işletim sistemi için hazırlanmıştır. Yazdığınız not…☆13Apr 13, 2025Updated 11 months ago
- ☆19Mar 13, 2022Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Java and Android mobile alerting and secure wipe application(s)☆24Oct 8, 2011Updated 14 years ago
- Android Debug Bridge (ADB) over Piping Serer on Web browser☆22Nov 14, 2023Updated 2 years ago
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 9 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- ☆15Feb 2, 2025Updated last year
- ☆11May 30, 2021Updated 4 years ago
- Public repository of all things cloud security.☆48Sep 20, 2024Updated last year
- ☆40Jul 30, 2023Updated 2 years ago
- ☆14Jun 19, 2024Updated last year
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- a sudo/doas alternative☆11Jan 19, 2023Updated 3 years ago
- Docker cleanup shell script.☆14Dec 29, 2017Updated 8 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- ☆18Dec 11, 2019Updated 6 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- K Nearest Neighbors classifier from scratch for image classification using MNIST Data Set.☆10Sep 14, 2018Updated 7 years ago
- ☆12Jun 4, 2025Updated 9 months ago
- ☆39Mar 9, 2023Updated 3 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated 2 months ago
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆25Feb 22, 2026Updated last month
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated 10 months ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 5 years ago