ryanmrestivo / blue-team
Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs with caution.
☆34Updated last year
Alternatives and similar repositories for blue-team:
Users that are interested in blue-team are comparing it to the libraries listed below
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- AD Live changes viewer☆35Updated 2 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆13Updated 4 years ago
- ☆23Updated last month
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Updated 2 years ago
- Threat Mitigation Strategies☆25Updated last year
- ☆35Updated 2 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆32Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- ☆18Updated 2 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆51Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- Azure AD Incident Response☆25Updated 3 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- ASR Configurator, Essentials and Atomic Testing☆39Updated last week
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated 8 months ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆29Updated 2 weeks ago
- ☆38Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Scans the filesystem for directories that are user-writeable☆11Updated 3 years ago
- Kerberoast Detection Script☆30Updated 5 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Azure AD enumeration over MS Graph☆80Updated 2 years ago