One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
-
Updated
May 24, 2025 - Python
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
A curated list of cybersecurity tools and resources.
Awesome Security lists for SOC/CERT/CTI
Halberd : Multi-Cloud Agentic Attack Tool
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
通过获取到的webshell流量、url、key来还原攻击者使用webshell所做的操作。
Testing platform for covert data exfiltration techniques where sensitive documents are embedded into vector representations and tunneled out under the guise of legitimate RAG operations — bypassing traditional security controls and evading detection through semantic obfuscation.
Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
A tool that allows you to document and assess any security automation in your SOC
Cyber threat intelligence tool suite.
urlyzer is a URL parsing analysis tool.
This is a repo for cybersecurity analyst collecting artifacts in a incident response case.
This script detects typosquatting domains by generating typo variations of a given domain name, checking if they return a valid HTTP response, and running a WHOIS lookup to determine if the domain is registered, then generates an HTML report with the findings.
A curated collection of essential resources, tools, and references for Security Operations Center (SOC) analysts.
You can simulate an entire ocean of honeypots with just one database.(你只需要一个数据库就可以模拟一片蜜罐汪洋)
Malware repository and analysis platform
PyCanary: CMD line tool to monitor any directory for file access or file changes, log event, send basic alert to user, and dump and process information collected. There is also a background thread monitoring all created processes and logging them for later analysis.
A script that webs scrapes multiple webpages for known vulnerable Windows Drivers, SHA256 hashes all system drivers, looks for matching driver names and SHA256 hashes.
Add a description, image, and links to the blueteam-tools topic page so that developers can more easily learn about it.
To associate your repository with the blueteam-tools topic, visit your repo's landing page and select "manage topics."