Analysis of the Shadow Broker/ Equation Group dumps.
-
Updated
Jun 1, 2017 - Python
Analysis of the Shadow Broker/ Equation Group dumps.
Public Toolkit - https://mikeabreu.github.io/public-toolkit/
A collection of scripts I've written to help red and blue teams with malware persistence techniques.
👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely u…
📘🛠️My self-described "Blue Team Library". A collection of scripts I've used over time to remediate various vulnerabilites.
Simple python framework to parse Windows icon files
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.
Windows AD wide windows event collection script for scaled up forensic investigations.
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会
Actionable analytics designed to combat threats based on MITRE's ATT&CK.
Simple powershell script to find living off land binaries and scripts on a system.
Add a description, image, and links to the blueteam topic page so that developers can more easily learn about it.
To associate your repository with the blueteam topic, visit your repo's landing page and select "manage topics."