securethelogs / BlueRabbit
Blue Team Powershell Script
☆18Updated 3 years ago
Alternatives and similar repositories for BlueRabbit:
Users that are interested in BlueRabbit are comparing it to the libraries listed below
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆23Updated 4 years ago
- Ideaslocas Repository☆37Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- OSCP Focused Lab Pastable with some general Red Teaming Pastables.☆10Updated 5 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- ☆34Updated 6 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 9 months ago