E-mails, subdomains and names Harvester - OSINT
-
Updated
Jul 3, 2024 - Python
E-mails, subdomains and names Harvester - OSINT
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Investigate malicious Windows logon by visualizing and analyzing Windows event log
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Bloodhound Reporting for Blue and Purple Teams
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Data leak checker & OSINT Tool
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes.
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely u…
BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Awesome Security lists for SOC/CERT/CTI
Slack enumeration and exposed secrets detection tool
Graph Visualization for windows event logs
Finding exposed secrets and personal data in GitLab
Search for Unix binaries that can be exploited to bypass system security restrictions.
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Emulate and Dissect MSF and *other* attacks
Add a description, image, and links to the blueteam topic page so that developers can more easily learn about it.
To associate your repository with the blueteam topic, visit your repo's landing page and select "manage topics."