A bunch of scripts used for network defense during competitions.
☆15Apr 3, 2015Updated 11 years ago
Alternatives and similar repositories for BlueTeam
Users that are interested in BlueTeam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- this is a command line (linux, osx) rfc reader☆15Oct 12, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- CMSmap is a python open source CMS (Content Management System) scanner that automates the process of detecting security flaws of the most…☆80Jun 27, 2014Updated 11 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 10 years ago
- gamebox admin scripts for DEF CON 22~23 CTF Finals☆16Mar 14, 2016Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Eagle is a Web Application Attack and Audit Framework. Eagle has moved to Bitbucket.☆11Nov 21, 2016Updated 9 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Recognizes your speech in mp3 audio file, wav file or laptop microphone and converts to text☆10Nov 18, 2019Updated 6 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM c…☆18Sep 23, 2025Updated 7 months ago
- Zeek scripting language highlighting/support for Sublime Text☆18Jul 20, 2021Updated 4 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆21Apr 26, 2025Updated last year
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- configure DNS/proxy for one process execution on Linux 📡☆28Mar 28, 2025Updated last year
- POC for leaking java version through file and ftp protocols☆24Nov 1, 2020Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 10 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- SOCKS5 proxy library for Go☆29May 30, 2021Updated 4 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Oct 16, 2014Updated 11 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- builds database/visualizations of LAN structure from passively sifted information☆148May 30, 2014Updated 11 years ago
- ☆12Jan 9, 2018Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Jan 8, 2019Updated 7 years ago
- Ruby interface to cirt.net default passwords database☆19May 4, 2011Updated 14 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago