Analysis of the Shadow Broker/ Equation Group dumps.
-
Updated
Jun 1, 2017 - Python
Analysis of the Shadow Broker/ Equation Group dumps.
Simple python framework to parse Windows icon files
Actionable analytics designed to combat threats based on MITRE's ATT&CK.
Recursively repository cloning & do something inside that shit
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
A blueteam tool to simulate attacks using Atomic Red Team and other techniques.
Jekyll repo for my netsec related blog.
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Apache log analyzer, lightweight log parser for cybersecurity analyst.
A collection of tools & guides for the planning and implementation of MITRE D3FEND. This repository is independent research and is not an official nor a sanctioned MITRE D3FEND resource.
Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can…
A user-friendly and powerful tool to analyze Windows Security Events
A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.
Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.
Repository with Sample KQL Query examples for Threat Hunting
Enhance your malware detection with WAF + YARA (WAFARAY)
Add a description, image, and links to the blueteaming topic page so that developers can more easily learn about it.
To associate your repository with the blueteaming topic, visit your repo's landing page and select "manage topics."