maldevel / blue-teamLinks
Blue Team Scripts
☆251Updated 6 years ago
Alternatives and similar repositories for blue-team
Users that are interested in blue-team are comparing it to the libraries listed below
Sorting:
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆163Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Swordphish Phishing Awareness Tool☆224Updated 11 months ago
- ☆282Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 2 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Automated Tactics Techniques & Procedures☆257Updated 2 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆382Updated 7 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- Red Team Tactics, Techniques, and Procedures☆408Updated 2 weeks ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- Test Blue Team detections without running any attack.☆271Updated last year
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- Pastebin OSINT Harvester☆324Updated 6 years ago
- DejaVU - Open Source Deception Framework☆414Updated 3 weeks ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- thethe☆116Updated 4 years ago
- Penetration testing scripts☆145Updated 7 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆184Updated last year
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 7 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 4 months ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- A ton of helpful tools☆338Updated 3 years ago