ceramicskate0 / YABTR
Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend products.
☆2Updated 5 years ago
Alternatives and similar repositories for YABTR:
Users that are interested in YABTR are comparing it to the libraries listed below
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Some simple and useful tools☆15Updated 6 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A few transforms and a machine for parsing Nmap XML results☆37Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A curated list of tools for incident response☆29Updated last year
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆64Updated 7 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- See here:☆42Updated 12 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Small scripts for doing repeatable tasks☆25Updated 2 years ago