This contains a list of Blue Team Tools that I use daily, and have stored here for reference.
☆34Nov 7, 2017Updated 8 years ago
Alternatives and similar repositories for Blue-Team-Tools
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
Sorting:
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- -☆11Nov 21, 2020Updated 5 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 9 months ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- ☆17May 28, 2022Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- Payloads and Lists☆23Feb 12, 2020Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- ☆21Apr 14, 2017Updated 8 years ago
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Multithreaded threat Intelligence gathering built with Python3☆178Jan 23, 2018Updated 8 years ago
- ☆28May 25, 2021Updated 4 years ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Powershell Threat Hunting Module☆290Sep 21, 2016Updated 9 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- IDOR testing tool. Coded during Lunizz live stream.☆31May 11, 2020Updated 5 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Jun 22, 2023Updated 2 years ago
- ☆31Feb 10, 2023Updated 3 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆41Aug 23, 2024Updated last year
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago