COLLECTED BY
Organization:
Internet Archive
Focused crawls are collections of frequently-updated webcrawl data from narrow (as opposed to broad or wide) web crawls, often focused on a single domain or subdomain.
The Wayback Machine - https://web.archive.org/web/20220204021436/https://github.com/topics/blueteam
Here are
180 public repositories
matching this topic...
E-mails, subdomains and names Harvester - OSINT
Updated
Feb 3, 2022
Python
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Updated
Jan 23, 2022
XSLT
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Updated
Dec 28, 2021
Jupyter Notebook
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Updated
Dec 19, 2021
Python
Free copy of The Cyber Plumber's Handbook
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Updated
Dec 10, 2018
XSLT
A collection of awesome security hardening guides, tools and other resources
The goal of this repository is to document the most common techniques to bypass AppLocker.
Updated
Feb 18, 2021
PowerShell
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Updated
Feb 2, 2022
Python
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Updated
Jan 27, 2022
HTML
Windows Hardening settings and configurations
Updated
Jan 15, 2022
PowerShell
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Updated
May 14, 2021
Python
Bloodhound for Blue and Purple Teams
Updated
Sep 20, 2021
Python
Active Directory ACL Visualizer and Explorer - who's really Domain Admin?
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
Updated
Jan 13, 2022
JavaScript
红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
Updated
Jan 21, 2022
Batchfile
🍓 📡 🍍 Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Updated
Feb 1, 2020
Python
This repository contains full code examples from the book Gray Hat C#
Web Application Secure Coding Handbook resource.
Data leak checker & OSINT Tool
Updated
Mar 15, 2021
Python
Bi-weekly hunting queries
Find cloud assets that no one wants exposed 🔎 ☁️
Improve this page
Add a description, image, and links to the
blueteam
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
blueteam
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
RITA does not store information on how long an import took or how much data was processed in an import.
This ticket is to implement, at a minimum, those metrics mentioned above into the RITA logging.