Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
-
Updated
May 23, 2024 - Python
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A collection of awesome security hardening guides, tools and other resources
Tools and Techniques for Blue Team / Incident Response
AD Security Intrusion Detection System
RedEye is a visual analytic tool supporting Red & Blue Team operations
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
An Active Defense and EDR software to empower Blue Teams
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event s…
The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
网络安全 · 攻防对抗 · 蓝队清单,中文版
🦄🔒 Awesome list of secrets in environment variables 🖥️
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely u…
Browser Protector against various stealers, written in C# & C/C++.
Detecting ATT&CK techniques & tactics for Linux
Add a description, image, and links to the blue-team topic page so that developers can more easily learn about it.
To associate your repository with the blue-team topic, visit your repo's landing page and select "manage topics."