ryanmrestivo / blue-team
Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs with caution.
☆34Updated last year
Alternatives and similar repositories for blue-team:
Users that are interested in blue-team are comparing it to the libraries listed below
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆25Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- ☆17Updated 2 years ago
- Threat Mitigation Strategies☆25Updated last year
- ☆22Updated 3 weeks ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Updated 2 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆33Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆32Updated last year
- ☆35Updated 2 years ago
- Living off the False Positive!☆35Updated 2 months ago
- AD Live changes viewer☆35Updated 2 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆13Updated 4 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆27Updated 8 months ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- ☆15Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆48Updated 3 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- ☆7Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago