CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis
☆525Apr 18, 2026Updated 2 weeks ago
Alternatives and similar repositories for CyberBlue
Users that are interested in CyberBlue are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- INVENTORY é um painel web que exibe dados extraídos da API do Wazuh, via SysCollector. A solução oferece acesso rápido a detalhes do sis…☆52Apr 4, 2026Updated last month
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆27Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆37Mar 24, 2025Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆732Apr 2, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Captures network traffic app made in Rust.☆81Apr 28, 2026Updated last week
- VulScanner - is a powerful, multi-faceted tool designed for security professionals, developers, and penetration testers to perform automa…☆39Jul 29, 2025Updated 9 months ago
- Extracting IoC data from eMail☆141Jan 5, 2026Updated 4 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆571Apr 29, 2026Updated last week
- VoIP honeypot system☆22Apr 2, 2024Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆22Sep 22, 2025Updated 7 months ago
- Open Adversarial Exposure Validation Platform☆1,692Updated this week
- Convert Sigma rules to SIEM queries, directly in your browser.☆114Apr 18, 2026Updated 2 weeks ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆88Mar 6, 2025Updated last year
- ☆149Jun 9, 2025Updated 10 months ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace☆24Jul 19, 2023Updated 2 years ago
- Repo to hold wazuh manager mcp server☆81Apr 15, 2026Updated 3 weeks ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆452Apr 29, 2026Updated last week
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- DFIR Timeline Analysis for macOS — SQLite-backed viewer for CSV, TSV, XLSX, EVTX, Plaso, $MFT, and $J files with built-in process inspect…☆240Updated this week
- A YARA & Malware Analysis Toolkit written in Rust.☆107Apr 29, 2026Updated last week
- ☆160Oct 2, 2025Updated 7 months ago
- Incident Response documents and tooling☆115Dec 23, 2025Updated 4 months ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- Traefik | Authentik | Crowdsec | Netbird☆16Nov 23, 2025Updated 5 months ago
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆84Apr 16, 2026Updated 2 weeks ago
- SOCFortress CoPilot☆481Updated this week
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive securi…☆1,066Mar 29, 2026Updated last month
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago