🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
-
Updated
Sep 10, 2024 - Python
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can generate reports.
All my Source Codes (Repos) for Red-Teaming & Pentesting Blue Teaming
Repository with Sample KQL Query examples for Threat Hunting
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Enhance your malware detection with WAF YARA (WAFARAY)
A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.
Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can…
This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.
List of sources for cybersecurity news
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool
Actionable analytics designed to combat threats based on MITRE's ATT&CK.
A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.
BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detections via yaml files
Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.
Add a description, image, and links to the blueteaming topic page so that developers can more easily learn about it.
To associate your repository with the blueteaming topic, visit your repo's landing page and select "manage topics."