dcarlin / Blue-Team-Tools
This contains a list of Blue Team Tools that I use daily, and have stored here for reference.
ā33Updated 7 years ago
Alternatives and similar repositories for Blue-Team-Tools:
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
- š”ļø A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.ā12Updated 5 years ago
- A curated list of FOSS software appliances for building a SOCā18Updated 4 years ago
- Reference sheet for Threat Hunting Professional Courseā25Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.ā32Updated 5 years ago
- This repo is where I store my Threat Hunting ideas/contentā86Updated last year
- ā26Updated 3 years ago
- ā63Updated 3 years ago
- Resources for AD penetration testing and securityā29Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedureā15Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.ā43Updated 2 years ago
- Random notes collected on the intertubes relating to DFIRā32Updated last year
- Threat Hunter's Knowledge Baseā22Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshopā59Updated this week
- Repo of python/bash scripts for identifying IoC's in threat feed and other online toolsā26Updated 4 years ago
- Sharing Threat Hunting runbooksā24Updated 5 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to cā¦ā16Updated 5 years ago
- Ransomware Simulator for testing Blue Team Detectionsā37Updated 2 years ago
- Quick SOC L1 ticket structureā35Updated 5 years ago
- ā28Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.ā39Updated 2 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networksā25Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEMā12Updated 4 years ago
- Slides and materials for conference presentationsā11Updated last year
- List of PowerShell commands and commandlets that should be in your Powershel watchlistā37Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK techniqueā17Updated 3 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.ā48Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queriesā48Updated 2 years ago
- ā17Updated last year
- A ransomware group monitoring bot written in C#.ā55Updated 2 years ago
- TA505+ Adversary Simulationā65Updated 4 years ago