LLM supported Toolkit for Blue Team/ SOC Operations
☆45Jan 10, 2026Updated last month
Alternatives and similar repositories for Blue-Team-Assistant
Users that are interested in Blue-Team-Assistant are comparing it to the libraries listed below
Sorting:
- Cyber Threat Intelligence☆77Dec 7, 2025Updated 2 months ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- ☆12Jun 9, 2021Updated 4 years ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated 11 months ago
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- This tool is design for FTP brute force☆13Jan 23, 2024Updated 2 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- ☆13Dec 14, 2021Updated 4 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆41Updated this week
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- ☆11Nov 8, 2023Updated 2 years ago
- Actual good v3 onion links☆14Jan 19, 2026Updated last month
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 3 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- A comprehensive malware detection and dynamic analysis system, designed to analyse malware samples and benign files & classify them using…☆14Sep 18, 2023Updated 2 years ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- A package that get baseball data☆13Feb 24, 2025Updated last year
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 2 weeks ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆27Jan 30, 2026Updated 3 weeks ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 7 years ago