ufsitblue / blueLinks
UFSIT scripts and tools for hardening and auditing
☆14Updated 5 months ago
Alternatives and similar repositories for blue
Users that are interested in blue are comparing it to the libraries listed below
Sorting:
- ☆152Updated 6 months ago
 - Lena's repo of Malware Monsters aka Malmons.☆44Updated last month
 - VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆147Updated 3 months ago
 - Retired TrustedSec Capabilities☆248Updated 11 months ago
 - ☆244Updated 4 months ago
 - A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
 - Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
 - A collection of tools, scripts and personal research☆145Updated 2 months ago
 - Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆70Updated last year
 - Tool designed to exfiltrate OneDrive Business OCR Data☆123Updated 9 months ago
 - This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
 - ☆70Updated 9 months ago
 - LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 2 weeks ago
 - Completely Risky Active-Directory Simulation Hub☆103Updated last year
 - This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆61Updated last year
 - ☆136Updated 2 years ago
 - This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆104Updated 2 months ago
 - A repository of credential stealer formats☆229Updated 4 months ago
 - A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆200Updated last year
 - A set of tools and resources for analysis of Havoc C2☆24Updated last year
 - A collection of art inspired by the world of cybersecurity and hacking culture.☆38Updated 5 months ago
 - Repo of RIT CCDC Team Scripts☆14Updated 3 years ago
 - WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆165Updated 7 months ago
 - ☆109Updated 3 months ago
 - The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆58Updated 2 months ago
 - Source code for complete MALicious softWARE books I & II☆55Updated 3 weeks ago
 - LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 8 months ago
 - Powershell Linter☆84Updated last week
 - Python utility that generates "imageless" QR codes in various formats☆130Updated last year
 - Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago