simeononsecurity / Blue-Team-ToolsLinks
A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.
☆103Updated last year
Alternatives and similar repositories for Blue-Team-Tools
Users that are interested in Blue-Team-Tools are comparing it to the libraries listed below
Sorting:
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆89Updated 2 years ago
- ☆53Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- ☆70Updated 4 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆173Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- an awesome list of active defense resources☆127Updated 5 years ago
- Fast IOC and YARA Scanner☆86Updated 5 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆145Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated 4 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 8 months ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated last year
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- ☆67Updated 3 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- ☆18Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆86Updated 4 months ago