averagesecurityguy / blue
Scripts that are suited for blue teams
☆33Updated 8 years ago
Alternatives and similar repositories for blue:
Users that are interested in blue are comparing it to the libraries listed below
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Small scripts for doing repeatable tasks☆25Updated 2 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- ☆25Updated 8 years ago
- Some simple and useful tools☆15Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Easy Window domain access☆51Updated 10 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- PowerShell Empire docker build☆23Updated 8 years ago
- AYY LMAO☆21Updated 8 years ago
- Prometheus Firewall Analyzer☆47Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Mutable Universal Relay Document Kit☆17Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- ☆61Updated 6 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 10 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆47Updated 8 years ago
- Find a useable IP address to use☆29Updated 10 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Executes PowerShell from an unmanaged process☆28Updated 10 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago