Scripts that are suited for blue teams
☆33Mar 17, 2016Updated 9 years ago
Alternatives and similar repositories for blue
Users that are interested in blue are comparing it to the libraries listed below
Sorting:
- Virustotal Lookup filter for Logstash☆16May 11, 2017Updated 8 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆20Oct 28, 2015Updated 10 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Honeypot repo☆48Aug 10, 2015Updated 10 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Blue Team Scripts☆253Jun 20, 2019Updated 6 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- ☆16Jul 19, 2021Updated 4 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- ☆49Mar 31, 2016Updated 9 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- [ABANDONED] A Docker container running Suricata and the ELK stack.☆21Jan 27, 2016Updated 10 years ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Python scripts for parsing the index file and individual cache files from the cache2 folder of Firefox defaulted on in version 32☆27Sep 27, 2018Updated 7 years ago
- ☆49Mar 14, 2015Updated 10 years ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- Bringing DevOps to Forensics☆34Feb 4, 2015Updated 11 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Jan 2, 2023Updated 3 years ago
- Guide For WAF Bypass Techniques☆28Aug 15, 2020Updated 5 years ago
- A GPL fork of the popular wordpress vulnerability scanner WPScan☆214Aug 23, 2019Updated 6 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆459Feb 4, 2022Updated 4 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago