A collection of Python resources for Blue Team security work
☆16Sep 23, 2018Updated 7 years ago
Alternatives and similar repositories for pythonforblueteam
Users that are interested in pythonforblueteam are comparing it to the libraries listed below
Sorting:
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆26Jun 22, 2022Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆14Updated this week
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- ☆12Sep 16, 2023Updated 2 years ago
- Custom Component for Homeassistant Providing Travel Time Information using openrouteservice.org☆14Mar 20, 2024Updated last year
- ☆11Aug 15, 2018Updated 7 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- Official website of Giada Loop Machine. Powered by NodeJS, SASS, Pug and other beautiful JavaScript machineries.☆15Feb 3, 2026Updated 3 weeks ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- Example tremolo effect for Feather M4 + SGTL5000☆12Jun 13, 2023Updated 2 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- A Twitter block list of known porn bot accounts.☆10Mar 12, 2018Updated 7 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- Splunk Remote Work Insights - Executive Dashboard☆43Aug 20, 2020Updated 5 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago