dcarlin / Blue-Team-ToolsLinks
This contains a list of Blue Team Tools that I use daily, and have stored here for reference.
☆35Updated 7 years ago
Alternatives and similar repositories for Blue-Team-Tools
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
Sorting:
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- ☆64Updated 4 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- ☆70Updated 4 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- ☆29Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 8 months ago
- ☆15Updated 6 years ago
- Virtual Security Operations Center☆51Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 3 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- ☆21Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated 3 weeks ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago