💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
-
Updated
Jun 22, 2024
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
DejaVU - Open Source Deception Framework
Anti-forensic macOS tray application designed to safeguard your system by monitoring USB ports.
PowerShell scripts for communicating with a remote host.
Detecting ATT&CK techniques & tactics for Linux
Tools & Resources for Cyber Security Operations
A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts's ip or fqdn with the sole purpose of testing your own network to ensure there are no malicious services running.
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
PHP ransomware that encrypts your files, as well as file and directory names.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Bypass Malware Time Delays
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
CLI client (and Golang module) for deps.dev API. Free access to dependencies, licenses, advisories, and other critical health and security signals for open source package versions.
A blue-team tool, creates a list of USB-Rubber-Ducky instructions.
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
Secure website with a registration, sign in, session management, and CRUD controls.
This repository will describe the details surrounding the SIEM (wazuh) mini project, which will cover all aspects of topology design, deployment, rules, integration, and fine tune.
A scapy based module for programming offensive and defensive networking tools easier than before.
Add a description, image, and links to the defensive-security topic page so that developers can more easily learn about it.
To associate your repository with the defensive-security topic, visit your repo's landing page and select "manage topics."