maldevel / blue-team
Blue Team Scripts
☆244Updated 5 years ago
Alternatives and similar repositories for blue-team:
Users that are interested in blue-team are comparing it to the libraries listed below
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 5 months ago
- ☆280Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆304Updated 4 years ago
- Test Blue Team detections without running any attack.☆271Updated 8 months ago
- Respounder detects presence of responder in the network.☆317Updated 5 years ago
- Issues to consider when planning a red team exercise.☆614Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated 2 years ago
- Network Pivoting Toolkit☆438Updated last year
- Automated Tactics Techniques & Procedures☆252Updated last year
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Swordphish Phishing Awareness Tool☆223Updated 3 months ago
- Red Team Tactics, Techniques, and Procedures☆395Updated last month
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 6 years ago
- Credential and Red Teaming Defense for Windows Environments☆325Updated 6 months ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- Automated, Collection, and Enrichment Platform☆323Updated 5 years ago
- ☆234Updated 4 years ago
- Remote Recon and Collection☆448Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 6 months ago
- ☆377Updated 3 weeks ago
- Custom checklists, cheatsheets, links, and scripts☆126Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Updated 4 years ago
- A fully functional DanderSpritz lab in 2 commands☆423Updated 5 years ago
- ☆196Updated 3 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆146Updated 6 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆283Updated 6 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago