CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis
☆484Oct 16, 2025Updated 4 months ago
Alternatives and similar repositories for CyberBlue
Users that are interested in CyberBlue are comparing it to the libraries listed below
Sorting:
- INVENTORY é um painel web que exibe dados extraídos da API do Wazuh, via SysCollector. A solução oferece acesso rápido a detalhes do sis…☆45Jan 1, 2026Updated 2 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated 11 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection …☆725Feb 14, 2026Updated 2 weeks ago
- VulScanner - is a powerful, multi-faceted tool designed for security professionals, developers, and penetration testers to perform automa…☆36Jul 29, 2025Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.☆47Jan 22, 2026Updated last month
- Open Adversarial Exposure Validation Platform☆1,634Updated this week
- Convert Sigma rules to SIEM queries, directly in your browser.☆111Jan 24, 2026Updated last month
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Extracting IoC data from eMail☆140Jan 5, 2026Updated last month
- A YARA & Malware Analysis Toolkit written in Rust.☆95Feb 15, 2026Updated 2 weeks ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆23Updated this week
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 3 months ago
- ☆25Sep 17, 2025Updated 5 months ago
- Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.☆49Feb 12, 2026Updated 2 weeks ago
- Red Teaming Tradecraft☆30Sep 28, 2022Updated 3 years ago
- Files to automatically deploy red team Active Directory test lab☆49May 6, 2022Updated 3 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated 11 months ago
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 7 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 10 months ago
- Captures network traffic app made in Rust.☆76Feb 4, 2026Updated last month
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- ☆14Nov 18, 2021Updated 4 years ago
- A collection of CVEs weaponized by ransomware operators☆130Oct 13, 2025Updated 4 months ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆174Aug 13, 2025Updated 6 months ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆436Updated this week
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆206Nov 12, 2025Updated 3 months ago