A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.
☆106Jul 26, 2024Updated last year
Alternatives and similar repositories for Blue-Team-Tools
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆30Jul 26, 2024Updated last year
- Enhance the security and compliance of your standalone Windows servers with our STIG script, specifically designed to meet DoD STIG/SRG r…☆66Jul 26, 2024Updated last year
- Ansible Playbooks for SimeonOnSecurity's STIG Scripts☆15Jul 26, 2024Updated last year
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Jul 26, 2024Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Apr 27, 2025Updated last year
- UW-Stout CCDC team repository.☆14Apr 18, 2026Updated 2 weeks ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Template repo to quickly create new Github repos with Builds, CI/CD, Linting, Security Scanning, Pre-commit, Direnv, and lots of cool Bad…☆26Feb 3, 2026Updated 3 months ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Create a compliant and secure Windows 10/11 system with our Gold Master image creation tool. Adhere to DoD STIG/SRG Requirements and NSA …☆187Jul 26, 2024Updated last year
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆306Nov 13, 2021Updated 4 years ago
- All-in-one Scoring Engine☆32Mar 24, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Command Spy is a utility for monitoring the command line arguments of new processes on Windows. Made for CCDC.☆11Jul 30, 2023Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆138Apr 20, 2026Updated 2 weeks ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Nov 7, 2017Updated 8 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆462Feb 4, 2022Updated 4 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 6 months ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆34Mar 21, 2023Updated 3 years ago
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Apr 9, 2021Updated 5 years ago
- A collection of scripts and configurations for hardening various systems and applications.☆29Jul 26, 2024Updated last year
- ☆18Aug 2, 2025Updated 9 months ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 10 months ago
- Powershell Event Tracing Toolbox☆77Mar 21, 2022Updated 4 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆151Apr 27, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- This repository features a set of EA models and the supporting applications to transform, analyze, and query the model set.☆16Aug 6, 2024Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- ☆20May 30, 2025Updated 11 months ago
- ALPHA/WIP for OSquery configuration for Mac and Linux Operating Systems☆16Jan 9, 2018Updated 8 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago