Audit Powershell and search from known keywords in history #Blueteam
☆25Apr 22, 2020Updated 5 years ago
Alternatives and similar repositories for Bluechecker
Users that are interested in Bluechecker are comparing it to the libraries listed below
Sorting:
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 7 months ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Monitor internet facing resource for open ports #Blueteam☆14Apr 7, 2020Updated 5 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- A dashboard framework for visualizing complex data sets on T1V multi-panel displays☆22Jan 4, 2023Updated 3 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Simple Automated Powershell Keylogger☆23May 21, 2020Updated 5 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆111Mar 25, 2021Updated 4 years ago
- A curated list of Docker resources☆27Nov 13, 2015Updated 10 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- URL Screenshot Utility☆28May 22, 2023Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers☆33Updated this week
- Draft and review content for MoJ IT Policy.☆11Sep 2, 2020Updated 5 years ago
- Allowlist data for Web3Checks☆12Updated this week
- ☆77Jun 25, 2019Updated 6 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Jul 30, 2020Updated 5 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Jan 1, 2022Updated 4 years ago
- ☆38Oct 19, 2018Updated 7 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Red Team PowerShell Script☆336Jul 31, 2023Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago
- Samsung Theme Template☆14Aug 26, 2017Updated 8 years ago