Blue Team Resources
100+ curated tools, feeds, and platforms to hunt threats, analyze malware, and defend networks like a pro
CyberChef
The Cyber Swiss Army Knifeβdecode, decrypt, decompress, and analyze data without leaving your browser. Because sometimes you need to base64 decode a hex-encoded MD5 hash at 2am.
Threat Intelligence & Malware Analysis
Hunt malware, track threats, stay ahead of the bad guys
50+ ResourcesMalware Feeds & Tracking
Real-time feeds for banking trojans, C2 servers, and malware URLs
Threat Intelligence Platforms
Sandboxes, threat intel, and community-driven malware analysis
APT & Threat Research
APT campaigns, digital weapons, and advanced threat YARA rules
Network Security & Monitoring
Block the bad, monitor the ugly, analyze the weird
25+ ResourcesBlocklists & Reputation
IP/domain blocklists and reputation feeds to keep threats out
Phishing Detection
Email security, RBL checkers, and phishing feed aggregators
Network Analysis Tools
Packet analysis, PCAP files, and network forensics resources
Scanning & Reconnaissance Detection
Internet-wide scan data and scanner tracking
OSINT & Breach Intelligence
Find what's leaked, track what's pwned, investigate everything
20+ ResourcesBreach Databases
Search engines for data breaches and credential leaks
OSINT Tools & Resources
Email finding, validation, and comprehensive OSINT frameworks
Security Testing & Research
Test, enumerate, fuzzβbreak things legally so attackers can't
30+ ResourcesWeb Security Testing
Scanners, vulnerable apps, and web security validators
Security Tools & Scripts
Scanners, enumeration tools, and offensive security frameworks
Web Recon & Enumeration
URL discovery, wayback tools, and fuzzing resources
SecLists & Wordlists
Password lists, payloads, and enumeration wordlists
Malware Analysis Tools
Crawlers, sandboxes, and malware detection utilities
Found This Useful?
These are the tools and feeds that power real blue team operations. Happy hunting!