A list of resources to build a information security team.
☆15Feb 10, 2021Updated 5 years ago
Alternatives and similar repositories for awesome-blueteam
Users that are interested in awesome-blueteam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 11, 2021Updated 4 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 10 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated 2 years ago
- ☆22Feb 3, 2026Updated 2 months ago
- ☆23Mar 25, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Aug 23, 2019Updated 6 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆30Jun 18, 2025Updated 10 months ago
- System Tray Tool for WDAC☆39Mar 28, 2026Updated 3 weeks ago
- This repo contains the installation guide and EFI files required to get a perfectly functional macOS hackintosh on your Lenovo Thinkbook …☆14Jun 2, 2025Updated 10 months ago
- ☆22Mar 4, 2025Updated last year
- Discover gaps in Entra Conditional Access policies before attackers do☆107Mar 23, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24May 19, 2022Updated 3 years ago
- A concise cheatsheet for using Regular Expressions in JavaScript☆16Jan 30, 2021Updated 5 years ago
- Harden Windows with Windows Defender Application Control (WDAC)☆48Jul 26, 2024Updated last year
- CISCO configuration guides☆14Feb 16, 2020Updated 6 years ago
- ☆11Apr 18, 2018Updated 8 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆112Aug 26, 2024Updated last year
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Mar 28, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Apr 8, 2026Updated last week
- ☆14Dec 28, 2020Updated 5 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- A Python package that implements common AI techniques used in videogames, meant to be used with PyGame☆12Jun 10, 2019Updated 6 years ago
- ☆10Apr 27, 2025Updated 11 months ago
- Use this tools properly Only for education purpose☆11Jul 27, 2023Updated 2 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 4 months ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆12Feb 14, 2023Updated 3 years ago
- Misc resources and documents on my security research☆21Jan 25, 2017Updated 9 years ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- API Penetration Testing Notes☆17Sep 25, 2025Updated 6 months ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago