Analysis of the Shadow Broker/ Equation Group dumps.
-
Updated
Jun 1, 2017 - Python
Analysis of the Shadow Broker/ Equation Group dumps.
👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely u…
Simple python framework to parse Windows icon files
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.
A Lambda-powered Security Orchestration framework for AWS GuardDuty
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Pull your DS rules and build a ATT&CK matrix
Look for un-sinkholed C&C IPs in your Bro logs (from Bambanek Consulting C&C master list)
nsrllookup is a Web API built with Python and Flask. It exposes a route to lookup a single MD5 hash and returns "known" or "unkown".
Data leak checker & OSINT Tool
splits a URL into individual components, unescapes arguments, and performs light calculations for manual or automated analysis
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Add a description, image, and links to the blueteam topic page so that developers can more easily learn about it.
To associate your repository with the blueteam topic, visit your repo's landing page and select "manage topics."