Home

Awesome

image

BlueTeam

BlueTeam - Tools and more..


<details> <summary>

🤩 Awesome Cybersecurity Blue Team

Contents

Automation

Code libraries and bindings

Security Orchestration, Automation, and Response (SOAR)

See also Security Information and Event Management (SIEM), and IR management consoles.

Cloud platform security

See also asecure.cloud/tools.

Distributed monitoring

See also § Service and performance monitoring.

Kubernetes

See also Kubernetes-Security.info.

Service meshes

See also ServiceMesh.es.

Communications security (COMSEC)

See also Transport-layer defenses.

DevSecOps

See also awesome-devsecops.

Application or Binary Hardening

Compliance testing and reporting

Dependency confusion

See also § Supply chain security.

Fuzzing

See also Awesome-Fuzzing.

Policy enforcement

Supply chain security

See also § Dependency confusion.

Honeypots

See also awesome-honeypots.

Tarpits

Host-based tools

Sandboxes

Identity and AuthN/AuthZ

Incident Response tools

See also awesome-incident-response.

IR management consoles

See also Security Orchestration, Automation, and Response (SOAR).

Evidence collection

Network perimeter defenses

Firewall appliances or distributions

See also Wikipedia: List of router and firewall distributions.

Operating System distributions

Phishing awareness and reporting

See also awesome-pentest § Social Engineering Tools.

Preparedness training and wargaming

(Also known as adversary emulation, threat simulation, or similar.)

Security configurations

(Also known as secure-by-default baselines and implemented best practices.)

Security monitoring

Endpoint Detection and Response (EDR)

Network Security Monitoring (NSM)

See also awesome-pcaptools.

Security Information and Event Management (SIEM)

Service and performance monitoring

See also awesome-sysadmin#monitoring.

Threat hunting

(Also known as hunt teaming and threat detection.)

See also awesome-threat-detection.

Threat intelligence

See also awesome-threat-intelligence.

Fingerprinting

Threat signature packages and collections

Tor Onion service defenses

See also awesome-tor.

Transport-layer defenses

Overlay and Virtual Private Networks (VPNs)

macOS-based defenses

See also drduh/macOS-Security-and-Privacy-Guide.

Windows-based defenses

See also awesome-windows#security and awesome-windows-domain-hardening.

Active Directory

Monitoring


IDS - ( Intrusion Detection System )


image