A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspect.
☆33Apr 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for Blue
Users that are interested in Blue are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- ☆12Jul 15, 2022Updated 3 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 10 months ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generate Volatility3 profiles from BTF.☆33Dec 21, 2024Updated last year
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆79Dec 2, 2024Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆70Oct 20, 2025Updated 5 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 8 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Awesome list of custom content filters for Brave☆28Aug 27, 2025Updated 7 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆25Oct 14, 2025Updated 6 months ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 9 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆255Mar 26, 2026Updated 3 weeks ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆48Mar 5, 2026Updated last month
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆57Jul 2, 2023Updated 2 years ago
- ☆16Sep 5, 2024Updated last year
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆67Updated this week
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated last month
- ☆10Jul 1, 2023Updated 2 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- A simple apple crash report parser for rust☆26Mar 25, 2026Updated 3 weeks ago
- ☆13Dec 10, 2020Updated 5 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated 3 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Mar 22, 2026Updated 3 weeks ago
- ☆34Jun 13, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RDLL for Cobalt Strike beacon to silence sysmon process☆91Sep 9, 2022Updated 3 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆75Apr 11, 2026Updated last week
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Jun 28, 2021Updated 4 years ago
- A summary of NSO Group/Circles documents, research and media clippings.☆12Apr 13, 2024Updated 2 years ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- ☆12Jun 3, 2022Updated 3 years ago