A collection of Python resources for Blue Team security work
☆16Sep 23, 2018Updated 7 years ago
Alternatives and similar repositories for pythonforblueteam
Users that are interested in pythonforblueteam are comparing it to the libraries listed below
Sorting:
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- Build your own Dungeons & Dragons 5e character in the command line.☆10Jul 5, 2022Updated 3 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆12Feb 18, 2022Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- URL Fuzzer/Spider☆34Apr 10, 2016Updated 9 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- dot.files - shell stuff☆19Aug 12, 2023Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- ☆10May 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- The C Programming Language Book by Brian W. Kernighan and Dennis M. Ritchie - solved exercises☆16Apr 26, 2022Updated 3 years ago
- Custom Component for Homeassistant Providing Travel Time Information using openrouteservice.org☆14Mar 20, 2024Updated 2 years ago
- Alert a user when a new modqueue or post is made in a subreddit.☆12Feb 11, 2021Updated 5 years ago
- dotties <3☆18Sep 6, 2021Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Example tremolo effect for Feather M4 + SGTL5000☆12Jun 13, 2023Updated 2 years ago
- Source of http://madhur.co.in☆33Feb 28, 2026Updated 2 weeks ago
- ☆13Aug 11, 2020Updated 5 years ago
- Official website of Giada Loop Machine. Powered by NodeJS, SASS, Pug and other beautiful JavaScript machineries.☆15Feb 3, 2026Updated last month
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- ☆11Aug 15, 2018Updated 7 years ago
- A comfortable and accessible dark theme for Neovim☆11Jan 15, 2026Updated 2 months ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- bash poc scripts to exploit open fpm ports☆59Jul 31, 2019Updated 6 years ago
- Every single VirusShare MD5 hash in a single file.☆19May 10, 2023Updated 2 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 7 months ago
- ☆37Dec 17, 2020Updated 5 years ago