This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges
☆19Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber-Defenders
Users that are interested in Cyber-Defenders are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 5 months ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- introduction to distributed scanning using vultr☆11Apr 29, 2017Updated 9 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Leetcode solutions☆15Dec 24, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- A quick reference guide for python script development in DFIR☆18Mar 20, 2024Updated 2 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- 《FanZhi-攻击与反制的艺术》☆67Dec 8, 2023Updated 2 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆18Updated this week
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆15Sep 14, 2021Updated 4 years ago
- This project is no longer maintained☆13May 10, 2020Updated 5 years ago
- ☆22Mar 14, 2024Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆21Jul 14, 2022Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 3 months ago
- ☆17Feb 15, 2023Updated 3 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- ☆24Mar 8, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆12May 12, 2022Updated 3 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 6 months ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆42Jun 10, 2025Updated 10 months ago
- Simple scraper for automating challenges gathering from a CTFd platform☆50Jun 15, 2020Updated 5 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆45Oct 26, 2025Updated 6 months ago
- 自动化Google Hacking URL搜集工具☆10Apr 20, 2024Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 为CTF而生,随机或穷举指定格式HASH值,支持Fuzz MD系列、SHA系列等常见HASH类型☆66May 2, 2023Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 4 months ago
- 🔑 Simple MinIO access and secret key generator☆36Dec 19, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Java library used to upload files following the security steps described by OWASP☆10Jun 7, 2021Updated 4 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Here you can find writeups from various CTFs that I've participated in.☆12Jul 30, 2023Updated 2 years ago