operatorequals / Blue-BaronView external linksLinks
Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.
☆24Oct 31, 2022Updated 3 years ago
Alternatives and similar repositories for Blue-Baron
Users that are interested in Blue-Baron are comparing it to the libraries listed below
Sorting:
- Expose your Kubernetes resources to the world!☆11Dec 1, 2020Updated 5 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆13Oct 29, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆36Dec 12, 2025Updated 2 months ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- ☆17May 17, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆29Oct 17, 2018Updated 7 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆20Feb 2, 2022Updated 4 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago