dcarlin / Blue-Team-ToolsLinks
This contains a list of Blue Team Tools that I use daily, and have stored here for reference.
☆34Updated 8 years ago
Alternatives and similar repositories for Blue-Team-Tools
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
Sorting:
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated last week
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- ☆65Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- ☆21Updated 4 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated 2 years ago
- ☆70Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 5 years ago
- Curated list of awesome, open source data exfiltration tools☆64Updated 4 years ago
- All the useful tools interesting to be used☆23Updated 3 years ago
- ☆29Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Updated 7 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆13Updated 3 years ago
- ☆49Updated 2 months ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- an awesome list of active defense resources☆127Updated 5 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆127Updated 8 months ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- ☆28Updated 4 years ago