WGU-CCDC / Blue-Team-Tools
A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.
☆102Updated 2 years ago
Alternatives and similar repositories for Blue-Team-Tools:
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Windows Malware Investigation Scripts & Docs☆75Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ☆171Updated last year
- ☆56Updated 3 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆136Updated 3 weeks ago
- Obsidian Templates for OSCP, CPTS, and Training labs☆83Updated 3 weeks ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆111Updated last week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆183Updated last month
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- Deny list generator for password filters☆25Updated 7 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆322Updated 2 weeks ago
- List of tools and resources for pentesting Microsoft Active Directory☆42Updated last week
- List of Command&Control (C2) software☆35Updated 2 years ago
- ☆158Updated last year
- CLI tools for forensic investigation of Windows artifacts☆326Updated 4 months ago
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆217Updated last month
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆183Updated 3 months ago
- Internal Network Penetration Test Playbook☆16Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆390Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆405Updated this week
- ☆118Updated 11 months ago
- ☆141Updated 4 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆209Updated 2 years ago