dcarlin / Blue-Team-Tools
This contains a list of Blue Team Tools that I use daily, and have stored here for reference.
☆33Updated 7 years ago
Alternatives and similar repositories for Blue-Team-Tools:
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- ☆26Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Updated 5 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- ☆63Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 10 months ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆12Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- ☆64Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆43Updated 8 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 2 weeks ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Defensive Origins Training Schedule☆38Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- ☆77Updated 5 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated 2 years ago