svincode / BlueTeamLinks
A bunch of scripts used for network defense during competitions.
☆15Updated 10 years ago
Alternatives and similar repositories for BlueTeam
Users that are interested in BlueTeam are comparing it to the libraries listed below
Sorting:
- Simple, useful scripts for red/blue team situations☆22Updated 10 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 12 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- ☆35Updated 9 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- ☆46Updated 8 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Updated 8 years ago
- A tool to analyse JMX API security level.☆43Updated 11 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Updated 5 years ago
- Jira Information Gatherer☆29Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 9 years ago
- Socks5 server over Websockets☆40Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- DoS PoC's for SAP products☆51Updated 7 years ago
- LFI scan, exploit tool☆13Updated 11 years ago
- ☆20Updated last year
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated last year
- Test CVE-2018-0296 and extract usernames