brianreitz / awesome-blueteamView external linksLinks
A list of resources to build a information security team.
☆13Feb 10, 2021Updated 5 years ago
Alternatives and similar repositories for awesome-blueteam
Users that are interested in awesome-blueteam are comparing it to the libraries listed below
Sorting:
- ☆19Feb 3, 2026Updated last week
- A WDAC configuration repository with the sole intention of enriching MDE☆30Jun 18, 2025Updated 7 months ago
- System Tray Tool for WDAC☆39Jun 25, 2025Updated 7 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- How to bypass your Bell Aliant provided modems.☆12Feb 2, 2026Updated 2 weeks ago
- ☆22Nov 22, 2025Updated 2 months ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Harden Windows with Windows Defender Application Control (WDAC)☆47Jul 26, 2024Updated last year
- ☆13Aug 11, 2018Updated 7 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- Python for cybersecurity repo☆16Nov 27, 2025Updated 2 months ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- CISCO configuration guides☆14Feb 16, 2020Updated 6 years ago
- ☆15Apr 10, 2025Updated 10 months ago
- A concise cheatsheet for using Regular Expressions in JavaScript☆16Jan 30, 2021Updated 5 years ago
- ☆10Apr 27, 2025Updated 9 months ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆11Dec 25, 2025Updated last month
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Node JS web app using docker☆13Dec 22, 2022Updated 3 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Oct 20, 2024Updated last year
- ☆13Aug 1, 2023Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- ☆23Oct 17, 2025Updated 3 months ago
- ☆15Mar 13, 2018Updated 7 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- ☆12May 4, 2023Updated 2 years ago
- ☆11Apr 18, 2018Updated 7 years ago