A list of resources to build a information security team.
☆13Feb 10, 2021Updated 5 years ago
Alternatives and similar repositories for awesome-blueteam
Users that are interested in awesome-blueteam are comparing it to the libraries listed below
Sorting:
- ☆22Feb 3, 2026Updated last month
- A WDAC configuration repository with the sole intention of enriching MDE☆30Jun 18, 2025Updated 8 months ago
- System Tray Tool for WDAC☆38Jun 25, 2025Updated 8 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- Harden Windows with Windows Defender Application Control (WDAC)☆48Jul 26, 2024Updated last year
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- ☆22Nov 22, 2025Updated 3 months ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- CISCO configuration guides☆14Feb 16, 2020Updated 6 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- Python for cybersecurity repo☆16Nov 27, 2025Updated 3 months ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- ☆10Apr 27, 2025Updated 10 months ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- ☆15Apr 10, 2025Updated 10 months ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A concise cheatsheet for using Regular Expressions in JavaScript☆16Jan 30, 2021Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Node JS web app using docker☆13Dec 22, 2022Updated 3 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- ☆13Aug 1, 2023Updated 2 years ago
- We took PersistenceSniper, merged it with Python, and misspelled it on purpose. Meet PyrsistenceSniper.☆36Updated this week
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Updated this week
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- A Python package that implements common AI techniques used in videogames, meant to be used with PyGame☆12Jun 10, 2019Updated 6 years ago
- ☆12May 4, 2023Updated 2 years ago
- ☆14Jun 11, 2021Updated 4 years ago