Skip to content

Commit 80e4fa4

Browse files
Update README.md
Signed-off-by: LUIZ HAMILTON ROBERTO DA SILVA <[email protected]>
1 parent bca5fad commit 80e4fa4

1 file changed

Lines changed: 37 additions & 48 deletions

File tree

BlueTeam-Tools/README.md

Lines changed: 37 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ All tools follow the same engineering principles applied across **Windows-SysAdm
2323

2424
## 🧪 Core Capabilities
2525

26-
[![Forensics](https://img.shields.io/badge/Forensics-Ready-black?style=for-the-badge)]() [![Logging](https://img.shields.io/badge/Logging-Structured-success?style=for-the-badge)]() [![Reports](https://img.shields.io/badge/Reports-CSV-informational?style=for-the-badge)]() [![GUI](https://img.shields.io/badge/GUI-Available-blueviolet?style=for-the-badge)]()
26+
[![Forensics](https://img.shields.io/badge/Forensics-Ready-black?style=for-the-badge)]() [![Logging](https://img.shields.io/badge/Logging-Structured-success?style=for-the-badge)]() [![Reports](https://img.shields.io/badge/Reports-CSV-informational?style=for-the-badge)]() [![GUI](https://img.shields.io/badge/GUI-Available-blueviolet?style=for-the-badge)]()
27+
2728
- 🔍 **Forensic Automation**
2829
Extraction of Windows Event Logs, registry artifacts, network sessions, user activity, and volatile system state.
2930

@@ -40,7 +41,7 @@ All tools follow the same engineering principles applied across **Windows-SysAdm
4041
[![Architecture](https://img.shields.io/badge/Architecture-Modular-008080?style=for-the-badge)]() [![Pipeline](https://img.shields.io/badge/Integration-IR%20Pipelines-4B0082?style=for-the-badge)]()
4142

4243
| Component | Purpose | Documentation |
43-
|---------|---------|--------|
44+
|-----------|---------|---------------|
4445
| **EventLogMonitoring** | Security-focused analysis of Windows Event Logs, including authentication failures, privilege escalation, lateral movement indicators, and policy violations. | [![Docs](https://img.shields.io/badge/View%20Docs-EventLogMonitoring-0A66C2?style=for-the-badge&logo=github)](EventLogMonitoring/README.md) |
4546
| **IncidentResponse** | Live-response and post-incident utilities for volatile artifacts, active sessions, system metadata, and threat indicators. | [![Docs](https://img.shields.io/badge/View%20Docs-IncidentResponse-0A66C2?style=for-the-badge&logo=github)](IncidentResponse/README.md) |
4647

@@ -64,75 +65,63 @@ Designed for professionals operating in:
6465

6566
[![PS](https://img.shields.io/badge/PowerShell-5.1%20%7C%207.x-5391FE?style=for-the-badge&logo=powershell)]() [![Admin](https://img.shields.io/badge/Privileges-Administrator-critical?style=for-the-badge)]()
6667

67-
- **PowerShell:**
68+
- **PowerShell**
6869
Minimum **5.1** (PowerShell 7+ recommended)
6970

70-
- **Administrative Privileges:**
71+
- **Administrative Privileges**
7172
Required to access protected system artifacts.
7273

73-
- **RSAT (when applicable):**
74-
```powershel
75-
Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability -Online
74+
- **RSAT (when applicable)**
75+
76+
```powershell
77+
Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability -Online
78+
```
79+
80+
- **Execution Policy (session-scoped)**
7681

77-
```
82+
```powershell
83+
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process
84+
```
7885

79-
- **Execution Policy (session-scoped):**
80-
81-
```powershell
82-
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process
83-
84-
```
85-
86-
- **Optional Modules:**
87-
`ActiveDirectory`, `Defender`, `DHCPServer`
88-
86+
- **Optional Modules**
87+
`ActiveDirectory`, `Defender`, `DHCPServer`
8988

9089
---
9190

9291
## 🚀 Getting Started
9392

94-
```powershel
95-
git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
96-
97-
cd Windows-SysAdmin-ProSuite/BlueTeam-Tools
98-
```
99-
93+
```powershell
94+
git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
95+
cd Windows-SysAdmin-ProSuite/BlueTeam-Tools
96+
```
97+
10098
**Recommended workflow:**
10199

102-
1. Select the appropriate category
103-
104-
2. Review the local `README.md`
105-
106-
3. Execute the script:
107-
108-
```powershell
109-
.\Script-Name.ps1
110-
111-
```
112-
113-
4. Review generated `.log` and `.csv` artifacts
114-
100+
1. Select the appropriate category
101+
2. Review the local `README.md`
102+
3. Execute the script:
103+
104+
```powershell
105+
.\Script-Name.ps1
106+
```
107+
108+
4. Review generated `.log` and `.csv` artifacts
115109

116110
> ⚠️ Always validate execution context before running in production or investigative environments.
117111
118112
---
119113

120114
## 🔗 Integration & Interoperability
121115

122-
[![GPO](https://img.shields.io/badge/Integration-GPOs-blue?style=for-the-badge)](https://chatgpt.com/c/69865ef3-2314-832b-bf49-c095b60862ae) [![Scheduled Tasks](https://img.shields.io/badge/Integration-Scheduled%20Tasks-4682B4?style=for-the-badge)](https://chatgpt.com/c/69865ef3-2314-832b-bf49-c095b60862ae) [![SIEM](https://img.shields.io/badge/Integration-SIEM-informational?style=for-the-badge)](https://chatgpt.com/c/69865ef3-2314-832b-bf49-c095b60862ae)
116+
[![GPO](https://img.shields.io/badge/Integration-GPOs-blue?style=for-the-badge)](https://chatgpt.com/) [![Scheduled Tasks](https://img.shields.io/badge/Integration-Scheduled%20Tasks-4682B4?style=for-the-badge)](https://chatgpt.com/) [![SIEM](https://img.shields.io/badge/Integration-SIEM-informational?style=for-the-badge)](https://chatgpt.com/)
123117

124118
BlueTeam tools are designed to integrate with:
125119

126-
- Incident response playbooks
127-
128-
- GPO-based execution models
129-
130-
- Scheduled forensic snapshots
131-
132-
- SIEM ingestion pipelines
133-
134-
- Compliance and audit evidence chains
135-
120+
- Incident response playbooks
121+
- GPO-based execution models
122+
- Scheduled forensic snapshots
123+
- SIEM ingestion pipelines
124+
- Compliance and audit evidence chains
136125

137126
---
138127

0 commit comments

Comments
 (0)