This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges
☆19Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber-Defenders
Users that are interested in Cyber-Defenders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- 安全基线☆19Jul 23, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Leetcode solutions☆15Dec 24, 2025Updated 3 months ago
- ☆14Mar 5, 2021Updated 5 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- 《FanZhi-攻击与反制的艺术》☆67Dec 8, 2023Updated 2 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- A guide to setting up Windows and MacOS the way I like it☆22Jun 25, 2025Updated 9 months ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- This project is no longer maintained☆13May 10, 2020Updated 5 years ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 3 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- ctf challenge solutions☆15Jul 28, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆68Mar 26, 2026Updated 3 weeks ago
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆11Sep 3, 2021Updated 4 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆42Jun 10, 2025Updated 10 months ago
- Short little AV Test to check Detection Rates☆20Jan 28, 2021Updated 5 years ago
- Simple scraper for automating challenges gathering from a CTFd platform☆50Jun 15, 2020Updated 5 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 5 months ago
- 自动化Google Hacking URL搜集工具☆10Apr 20, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- 为CTF而生,随机或穷举指定格式HASH值,支持Fuzz MD系列、SHA系列等常见HASH类型☆66May 2, 2023Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 3 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- 🔑 Simple MinIO access and secret key generator☆36Dec 19, 2021Updated 4 years ago
- Java library used to upload files following the security steps described by OWASP☆10Jun 7, 2021Updated 4 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago