🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
-
Updated
Jun 20, 2023 - Python
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Repository with Sample KQL Query examples for Threat Hunting
With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can generate reports.
Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
Enhance your malware detection with WAF + YARA (WAFARAY)
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can…
Repositorio de documentación y referencias relativas al mundo de la ciberseguridad, creado y mantenido por la Comunidad de ProtAAPP
Actionable analytics designed to combat threats based on MITRE's ATT&CK.
Analysis of the Shadow Broker/ Equation Group dumps.
A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.
BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detections via yaml files
Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool
Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
Add a description, image, and links to the blueteaming topic page so that developers can more easily learn about it.
To associate your repository with the blueteaming topic, visit your repo's landing page and select "manage topics."