E-mails, subdomains and names Harvester - OSINT
-
Updated
Nov 15, 2024 - Python
E-mails, subdomains and names Harvester - OSINT
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Investigate malicious Windows logon by visualizing and analyzing Windows event log
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Bloodhound Reporting for Blue and Purple Teams
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Data leak checker & OSINT Tool
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes.
Slack enumeration and exposed secrets detection tool
BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
Hourly updated database of exploit and exploitation reports
Graph Visualization for windows event logs
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely u…
Finding exposed secrets and personal data in GitLab
Emulate and Dissect MSF and *other* attacks
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Search for Unix binaries that can be exploited to bypass system security restrictions.
Add a description, image, and links to the blueteam topic page so that developers can more easily learn about it.
To associate your repository with the blueteam topic, visit your repo's landing page and select "manage topics."