52 Open Source Blueteam Software Projects
Free and open source blueteam code projects including engines, APIs, generators, and tools.
Gtfobins.github.io 3426 ⭐
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Logontracer 1522 ⭐
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Ultimateapplockerbypasslist 1074 ⭐
The goal of this repository is to document the most common techniques to bypass AppLocker.
Slackpirate 481 ⭐
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Repo Supervisor 447 ⭐
Scan your code for security misconfiguration, search for passwords and secrets. :mag:
Pidense 343 ⭐
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Bxss 310 ⭐
bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Remote Desktop Caching 165 ⭐
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Flerken 127 ⭐
A Solution For Cross-Platform Obfuscated Commands Detection 动静态Bash/CMD/PowerShell命令混淆检测框架
Cypheroth 143 ⭐
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Malwarepersistencescripts 103 ⭐
A collection of scripts I've written to help red and blue teams with malware persistence techniques.
Threathunt 85 ⭐
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Information Security Tasks 84 ⭐
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
T0thkr1s Gtfo 65 ⭐
Search for Unix binaries that can be exploited to bypass system security restrictions.
Qradar 28 ⭐
Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.
Bootsy 25 ⭐
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Opensource Endpoint Monitoring 25 ⭐
This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.
Secsuite Production 13 ⭐
A public repository for the #Secsuite project. Created & maintained by @ghostinthecable.
Kathe 12 ⭐
A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.
X33fcon 14 ⭐
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Cpldropper 18 ⭐
A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just double click them.
Null 11 ⭐
Anti keylogger, anti screen logger... Strategy to protect with hookings or improve your sandbox with spyware detection... - Demo