dcarlin / Blue-Team-ToolsLinks
This contains a list of Blue Team Tools that I use daily, and have stored here for reference.
☆34Updated 7 years ago
Alternatives and similar repositories for Blue-Team-Tools
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
Sorting:
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- ☆27Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- ☆63Updated 4 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Updated 5 years ago
- Quick SOC L1 ticket structure☆36Updated 6 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- ☆29Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Hunting Newly Registered Domains☆10Updated 6 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Python for Defenders Course Resources☆18Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- ☆21Updated 3 years ago