#
blueteam
Here are 145 public repositories matching this topic...
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
linux
unix
reverse-shell
binaries
post-exploitation
bypass
exfiltration
blueteam
redteam
bind-shell
gtfobins
-
Updated
Jul 17, 2021 - HTML
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
windows
linux
osx
reverse-engineering
hacking
forensics
penetration-testing
infosec
pentesting
references
information-security
privilege-escalation
exfiltration
infosec-reference
red-team
blueteam
hacking-simulator
privilege-escalation-exploits
mitre-attack-db
-
Updated
Jun 28, 2021
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
-
Updated
Jul 10, 2021 - XSLT
Investigate malicious Windows logon by visualizing and analyzing Windows event log
-
Updated
May 26, 2021 - Python
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
security
cheatsheet
cybersecurity
infosec
pentesting
bugbounty
pentest
blueteam
default-password
credentials-gathering
-
Updated
Jul 18, 2021 - Jupyter Notebook
ethack
commented
May 17, 2021
This feed is no longer available and the default config should be changed to disable it until it is fully removed from rita-bl.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
-
Updated
Dec 10, 2018 - XSLT
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
security
collection
study
poc
pentest
markdown-article
writeup
blueteam
ics-security
pentest-tool
redteam
linux-learning
post-penetration
-
Updated
Jul 14, 2021 - C++
Snoop — инструмент разведки на основе открытых данных (OSINT world)
security
parser
osint
scanner
geo
geolocation
scraping
web-scraping
ip
geocoder
police
infosec
ctf
termux
pentest
nickname
blueteam
redteam
username-checker
username-search
-
Updated
Jul 16, 2021 - Python
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Jun 29, 2021
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
-
Updated
May 14, 2021 - Python
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
-
Updated
May 11, 2021 - JavaScript
Bloodhound for Blue and Purple Teams
neo4j
directory
active-directory
bloodhound
active
infosec
blueteam
purpleteam
bloodhoundad
bloodhoundad-cypher-queries
purple-teams
plumhound-tasks
bloodhoundad-pathfinding-engine
bluehound
attack-paths
-
Updated
Jun 11, 2021 - Python
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
windows
persistence
commands
cheatsheet
enumeration
exploitation
privilege-escalation
blueteam
redteam
wadcoms
-
Updated
Dec 31, 2020 - HTML
-
Updated
Feb 1, 2020 - Python
Open
Add Docker support
GeekMasher
commented
Mar 4, 2018
This repository contains full code examples from the book Gray Hat C#
c-sharp
security
automation
xamarin
dotnet
mono
clamav
sql-injection
pentesting
fuzzer
nessus
openvas
sqlmap
payload
arachni
nexpose
cuckoo-sandbox
metasploit
blueteam
redteam
-
Updated
Jul 21, 2017 - C#
Data leak checker & OSINT Tool
python
data
gui
opensource
osint
email
pyqt5
password
cybersecurity
pyside2
pentest
leak
blueteam
security-tools
data-breach
data-security
data-leak
security-team
-
Updated
Mar 15, 2021 - Python
Windows Hardening settings and configurations
windows
checklist
security
registry
powershell
audit
windows-10
hardening
defense
blueteam
windows-hardening
policy-analyzer
-
Updated
Jul 14, 2021 - PowerShell
Test Blue Team detections without running any attack.
-
Updated
Oct 8, 2020 - C#
Find cloud assets that no one wants exposed 🔎 ☁️
aws
cloud
api-documentation
penetration-testing
infosec
blueteam
security-tools
cloud-security
attack-surface
amazonaws
security-engineer
-
Updated
Jul 20, 2020 - Go
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
-
Updated
Mar 8, 2021 - Shell
Bi-weekly hunting queries
-
Updated
Jun 25, 2021
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
hacking
forensics
penetration-testing
infrastructure-monitoring
forensic-analysis
blueteam
hacking-attack-tools
internal-pentest
redteaming
blue-team
redteam
hacking-tools
purpleteam
forensics-investigations
-
Updated
Aug 4, 2018 - Python
Monitoring your Slack workspaces for sensitive information
slack
tools
monitoring
cybersecurity
infosec
slack-api
red-team
blueteam
blue-team
redteam
purpleteam
purple-team
slack-workspaces
-
Updated
Dec 24, 2020 - Python
Improve this page
Add a description, image, and links to the blueteam topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the blueteam topic, visit your repo's landing page and select "manage topics."
Some of the dorks are not that helpful and coul be replaced with more useful stuff.