LLM supported Toolkit for Blue Team/ SOC Operations
☆50Jan 10, 2026Updated 2 months ago
Alternatives and similar repositories for Blue-Team-Assistant
Users that are interested in Blue-Team-Assistant are comparing it to the libraries listed below
Sorting:
- ☆16Feb 17, 2025Updated last year
- mario like platform game that uses pygame☆10Jun 29, 2015Updated 10 years ago
- ☆25Jan 15, 2025Updated last year
- Legacy repo of my discontinued reconstructer.org website with tools and papers from 2006 - 2013☆34Oct 1, 2021Updated 4 years ago
- This tool is design for FTP brute force☆13Jan 23, 2024Updated 2 years ago
- HackingResources for learning in 2020☆13Feb 15, 2021Updated 5 years ago
- Basic Excel Templates collection for mastering MS-Excel☆33Nov 26, 2022Updated 3 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 3 months ago
- A full stack e-commerce SPA, built with React, Redux, React Router and Firebase functions☆12Jan 9, 2023Updated 3 years ago
- A comprehensive malware detection and dynamic analysis system, designed to analyse malware samples and benign files & classify them using…☆14Sep 18, 2023Updated 2 years ago
- HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.☆19Aug 28, 2021Updated 4 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Fast Tool To Find Admin Panel Of Any Website☆20Jan 26, 2025Updated last year
- Key features: - Automated AI-driven interviews - Resume analysis and parsing - Real-time video conferencing - Structured evaluation of ca…☆17Aug 2, 2024Updated last year
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- Powershell scripts to implement a Tier administration model in Active Directory☆31Sep 22, 2020Updated 5 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Android Dynamic Class Dumper — dump all DEX files from running Android apps using Frida☆39Feb 16, 2026Updated last month
- ☆34Jun 12, 2025Updated 9 months ago
- Python Penetration Testing Essentials, Second Edition, published by Packt☆35Jan 15, 2021Updated 5 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated last year
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 4 months ago
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆26Sep 4, 2025Updated 6 months ago
- All-in-One Safety Evaluation Framwork☆44Mar 4, 2026Updated 2 weeks ago
- A modern approach to password rotation for the local administrator account on Windows 10 workstations utilizing Microsoft Endpoint Config…☆10May 5, 2020Updated 5 years ago
- Chat with anyone around the world using your own server and client☆31May 16, 2024Updated last year
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 4 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆30Jan 30, 2026Updated last month
- This firewall developed for my personal needs and I decided to make it a tool.☆25Jul 24, 2022Updated 3 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 4 years ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆32Aug 30, 2025Updated 6 months ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆178Dec 9, 2025Updated 3 months ago