Skip to content

Commit b169f55

Browse files
Update README.md
Signed-off-by: LUIZ HAMILTON ROBERTO DA SILVA <[email protected]>
1 parent 83d13e2 commit b169f55

1 file changed

Lines changed: 125 additions & 78 deletions

File tree

BlueTeam-Tools/README.md

Lines changed: 125 additions & 78 deletions
Original file line numberDiff line numberDiff line change
@@ -1,118 +1,165 @@
1-
# 🛡️ BlueTeam-Tools
2-
### DFIR · Event Logs · Incident Response · Forensic Readiness
1+
# 🔵 BlueTeam-Tools Suite
2+
### DFIR · Forensic Readiness · Security Visibility
33

4-
[![Parent Repo](https://img.shields.io/badge/Parent-Windows--SysAdmin--ProSuite-181717?style=for-the-badge&logo=github)](https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite)
4+
[![Parent](https://img.shields.io/badge/Parent-Windows--SysAdmin--ProSuite-181717?style=for-the-badge&logo=github)](../)
5+
[![BlueTeam](https://img.shields.io/badge/BlueTeam-DFIR-orange?style=for-the-badge)]()
6+
[![Forensics](https://img.shields.io/badge/Domain-Digital%20Forensics-black?style=for-the-badge)]()
7+
[![Security](https://img.shields.io/badge/Domain-Cybersecurity-critical?style=for-the-badge)]()
58
[![PowerShell](https://img.shields.io/badge/PowerShell-5.1%20%7C%207.x-5391FE?style=for-the-badge&logo=powershell&logoColor=white)]()
6-
[![Windows](https://img.shields.io/badge/Windows-10%20%7C%2011%20%7C%20Server-0078D6?style=for-the-badge&logo=windows&logoColor=white)]()
7-
[![DFIR](https://img.shields.io/badge/Domain-DFIR-critical?style=for-the-badge)]()
8-
[![Security](https://img.shields.io/badge/Focus-Cybersecurity-red?style=for-the-badge&logo=security)]()
9-
[![Forensics](https://img.shields.io/badge/Focus-Digital%20Forensics-black?style=for-the-badge)]()
9+
[![Windows](https://img.shields.io/badge/Windows-Server%20%7C%2010%20%7C%2011-0078D6?style=for-the-badge&logo=windows&logoColor=white)]()
1010

11-
**BlueTeam-Tools** is the defensive security and forensic analysis pillar of the
12-
**Windows-SysAdmin-ProSuite**, providing enterprise-grade PowerShell tooling for:
11+
---
12+
13+
## 🧭 Overview
14+
15+
[![Purpose](https://img.shields.io/badge/Purpose-Forensic%20Operations-blue?style=for-the-badge)]()
16+
[![Design](https://img.shields.io/badge/Design-Auditable-success?style=for-the-badge)]()
17+
[![Execution](https://img.shields.io/badge/Execution-Deterministic-6A5ACD?style=for-the-badge)]()
18+
19+
The **BlueTeam-Tools Suite** is a **forensic-grade PowerShell toolkit** designed for **Blue Team**, **DFIR**, and **Cybersecurity Operations** within Windows enterprise and public-sector environments.
1320

14-
- 🔍 Threat detection and investigation
15-
- 🧾 Windows Event Log analysis
16-
- 🕵️ Incident response support
17-
- 📊 Audit-ready forensic reporting
21+
It provides **repeatable**, **auditable**, and **incident-ready** tooling to support:
22+
23+
- Live-response operations
24+
- Event correlation and threat hunting
25+
- Evidence collection and forensic readiness
26+
- Security posture validation and audit support
27+
28+
All tools follow the same engineering principles applied across **Windows-SysAdmin-ProSuite**:
29+
**deterministic execution, structured logging, and governance alignment**.
1830

1931
---
2032

21-
## 🎯 Operational Scope
33+
## 🧪 Core Capabilities
2234

23-
[![Blue Team](https://img.shields.io/badge/Team-Blue%20Team-blue?style=for-the-badge)]()
24-
[![SOC](https://img.shields.io/badge/Environment-SOC-003366?style=for-the-badge)]()
25-
[![IR](https://img.shields.io/badge/Capability-Incident%20Response-darkred?style=for-the-badge)]()
26-
[![Audit](https://img.shields.io/badge/Use-Audit%20%26%20Compliance-success?style=for-the-badge)]()
35+
[![Forensics](https://img.shields.io/badge/Forensics-Ready-black?style=for-the-badge)]()
36+
[![Logging](https://img.shields.io/badge/Logging-Structured-success?style=for-the-badge)]()
37+
[![Reports](https://img.shields.io/badge/Reports-CSV%20%7C%20LOG-informational?style=for-the-badge)]()
38+
[![GUI](https://img.shields.io/badge/GUI-Available-blueviolet?style=for-the-badge)]()
2739

28-
Designed to support:
40+
- 🔍 **Forensic Automation**
41+
Extraction of Windows Event Logs, registry artifacts, network sessions, user activity, and volatile system state.
2942

30-
- Security Operations Centers (SOC)
31-
- DFIR teams
32-
- Judicial and public-sector investigations
33-
- Enterprise security audits
34-
- Post-incident technical reporting
43+
- 🛡️ **Incident Response Support**
44+
Live-response data capture, evidence preservation, and correlation during active or post-incident scenarios.
45+
46+
- 📊 **Security Visibility & Auditability**
47+
Policy validation, configuration auditing, and exportable `.csv` / `.log` artifacts suitable for compliance and investigations.
3548

3649
---
3750

38-
## 🧠 Core Capabilities
51+
## 🧩 Script Categories & Architecture
3952

40-
[![Event Logs](https://img.shields.io/badge/EventLogs-EVTX%20Analysis-orange?style=for-the-badge)]()
41-
[![Timeline](https://img.shields.io/badge/Forensics-Timeline%20Reconstruction-black?style=for-the-badge)]()
42-
[![Correlation](https://img.shields.io/badge/Analysis-Correlation-informational?style=for-the-badge)]()
43-
[![Artifacts](https://img.shields.io/badge/Artifacts-Windows%20Artifacts-blueviolet?style=for-the-badge)]()
53+
[![Architecture](https://img.shields.io/badge/Architecture-Modular-008080?style=for-the-badge)]()
54+
[![Integration](https://img.shields.io/badge/Integration-IR%20Pipelines-4B0082?style=for-the-badge)]()
55+
[![Structure](https://img.shields.io/badge/Structure-Folder%20Based-2F4F4F?style=for-the-badge)]()
4456

45-
- Parsing and querying Windows Event Logs (EVTX)
46-
- Detection of anomalous authentication behavior
47-
- Timeline reconstruction of user and system activity
48-
- Identification of lateral movement indicators
49-
- Correlation of logon, privilege, and service events
57+
| Component | Purpose | Documentation |
58+
|---------|---------|---------------|
59+
| **EventLogMonitoring** | Security-focused analysis of Windows Event Logs, including authentication failures, privilege escalation, lateral movement indicators, and policy violations. | [![Docs](https://img.shields.io/badge/View-README-0A66C2?style=for-the-badge&logo=github)](EventLogMonitoring/README.md) |
60+
| **IncidentResponse** | Live-response and post-incident utilities for volatile artifacts, active sessions, system metadata, and threat indicators. | [![Docs](https://img.shields.io/badge/View-README-0A66C2?style=for-the-badge&logo=github)](IncidentResponse/README.md) |
61+
62+
> Folder structure reflects **operational separation**, not execution order.
5063
5164
---
5265

53-
## 🧩 Directory Structure
54-
55-
```text
56-
BlueTeam-Tools/
57-
58-
├─ EventLogMonitoring/
59-
│ ├─ Authentication analysis
60-
│ ├─ Privilege escalation detection
61-
│ └─ Logon/session correlation
62-
63-
├─ IncidentResponse/
64-
│ ├─ Rapid triage scripts
65-
│ ├─ Evidence-oriented collection
66-
│ └─ Post-incident review helpers
67-
68-
└─ README.md
69-
```
66+
## 🏛️ Scope & Target Audience
67+
68+
[![Audience](https://img.shields.io/badge/Audience-Blue%20Team-orange?style=for-the-badge)]()
69+
[![Audience](https://img.shields.io/badge/Audience-DFIR-darkred?style=for-the-badge)]()
70+
[![Audience](https://img.shields.io/badge/Audience-Public%20Sector-0047AB?style=for-the-badge)]()
71+
[![Audience](https://img.shields.io/badge/Audience-Enterprise%20SOC-2E8B57?style=for-the-badge)]()
72+
73+
Designed for professionals operating in:
74+
75+
- Security Operations Centers (SOC)
76+
- Digital Forensics & Incident Response (DFIR)
77+
- Identity & Access Management investigations
78+
- Compliance, audit, and governance workflows
79+
- Public-sector and regulated environments
7080

7181
---
7282

73-
## 📤 Outputs & Evidence Handling
83+
## ⚙️ Requirements & Environment
84+
85+
[![PS](https://img.shields.io/badge/PowerShell-Minimum%205.1-5391FE?style=for-the-badge&logo=powershell)]()
86+
[![Privileges](https://img.shields.io/badge/Privileges-Administrator-critical?style=for-the-badge)]()
87+
[![Compatibility](https://img.shields.io/badge/Compatibility-Windows%20Native-success?style=for-the-badge)]()
7488

75-
[![Logs](https://img.shields.io/badge/Logs-Structured-success?style=for-the-badge)]()
76-
[![CSV](https://img.shields.io/badge/Reports-CSV-informational?style=for-the-badge)]()
77-
[![Chain of Custody](https://img.shields.io/badge/Forensics-Chain%20of%20Custody-black?style=for-the-badge)]()
89+
- **PowerShell**
90+
Minimum **5.1** (PowerShell 7+ supported)
7891

79-
Most tools generate:
92+
```powershell
93+
$PSVersionTable.PSVersion
94+
```
95+
96+
- **Administrative Privileges**
97+
Required to access protected system artifacts.
98+
99+
- **RSAT (when applicable)**
100+
101+
```powershell
102+
Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability -Online
103+
```
104+
105+
- **Execution Policy (session-scoped)**
106+
107+
```powershell
108+
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process
109+
```
80110

81-
- `.log` execution logs
82-
- `.csv` structured datasets
83-
- Timestamped artifacts
84-
- Reproducible outputs suitable for audits and investigations
111+
- **Optional Modules**
112+
`ActiveDirectory`, `Defender`, `DHCPServer`
85113

86114
---
87115

88-
## 🏛️ Governance & Forensic Principles
116+
## 🚀 Getting Started
89117

90-
[![Forensic Soundness](https://img.shields.io/badge/Principle-Forensic%20Soundness-critical?style=for-the-badge)]()
91-
[![Auditability](https://img.shields.io/badge/Principle-Auditability-success?style=for-the-badge)]()
92-
[![Reproducibility](https://img.shields.io/badge/Principle-Reproducibility-blue?style=for-the-badge)]()
118+
[![Clone](https://img.shields.io/badge/Access-Git%20Clone-181717?style=for-the-badge&logo=github)]()
119+
[![Workflow](https://img.shields.io/badge/Workflow-Review%20→%20Execute-blue?style=for-the-badge)]()
93120

94-
- Non-destructive data handling
95-
- Minimal system interaction
96-
- Explicit logging of all actions
97-
- Deterministic execution paths
121+
```powershell
122+
git clone https://github.com/brazilianscriptguy/Windows-SysAdmin-ProSuite.git
123+
cd Windows-SysAdmin-ProSuite/BlueTeam-Tools
124+
```
125+
126+
**Recommended workflow:**
127+
128+
1. Select the appropriate category
129+
2. Review the local `README.md`
130+
3. Execute the script
131+
4. Review generated `.log` and `.csv` artifacts
132+
133+
> ⚠️ Always validate execution context before running in production or investigative environments.
98134
99135
---
100136

101-
## ⚙️ Requirements
137+
## 🔗 Integration & Interoperability
102138

103-
[![PowerShell](https://img.shields.io/badge/PowerShell-5.1%20Required-5391FE?style=for-the-badge&logo=powershell)]()
104-
[![Admin](https://img.shields.io/badge/Privileges-Administrator-critical?style=for-the-badge)]()
105-
[![OS](https://img.shields.io/badge/OS-Windows%20Only-0078D6?style=for-the-badge&logo=windows)]()
139+
[![Integration](https://img.shields.io/badge/Integration-GPO-blue?style=for-the-badge)]()
140+
[![Integration](https://img.shields.io/badge/Integration-Scheduled%20Tasks-4682B4?style=for-the-badge)]()
141+
[![Integration](https://img.shields.io/badge/Integration-SIEM-informational?style=for-the-badge)]()
142+
143+
BlueTeam tools are designed to integrate with:
144+
145+
- Incident response playbooks
146+
- GPO-based execution models
147+
- Scheduled forensic snapshots
148+
- SIEM ingestion pipelines
149+
- Compliance and audit evidence chains
106150

107151
---
108152

109-
## 📬 Contact & Support
153+
## 🤝 Support & Community
110154

111-
[![Email](https://img.shields.io/badge/Email-luizhamilton.lhr%40gmail.com-D14836?style=for-the-badge&logo=gmail)](mailto:[email protected])
112-
[![Buy Me a Coffee](https://img.shields.io/badge/Buy%20Me%20a%20Coffee-Support-yellow?style=for-the-badge&logo=buymeacoffee)](https://buymeacoffee.com/brazilianscriptguy)
113-
[![Ko--fi](https://img.shields.io/badge/Ko--fi-Support-blue?style=for-the-badge&logo=kofi)](https://ko-fi.com/brazilianscriptguy)
114-
[![Patreon](https://img.shields.io/badge/Patreon-Support-red?style=for-the-badge&logo=patreon)](https://www.patreon.com/brazilianscriptguy)
155+
[![Email](https://img.shields.io/badge/[email protected]?style=for-the-badge&logo=gmail)](mailto:[email protected])
156+
[![Patreon](https://img.shields.io/badge/Support-Patreon-red?style=for-the-badge&logo=patreon)](https://patreon.com/brazilianscriptguy)
157+
[![BuyMeACoffee](https://img.shields.io/badge/Support-Buy%20Me%20a%20Coffee-yellow?style=for-the-badge&logo=buymeacoffee)](https://buymeacoffee.com/brazilianscriptguy)
158+
[![Ko-fi](https://img.shields.io/badge/Support-Ko--fi-blue?style=for-the-badge&logo=kofi)](https://ko-fi.com/brazilianscriptguy)
159+
[![GoFundMe](https://img.shields.io/badge/Support-GoFundMe-green?style=for-the-badge&logo=gofundme)](https://gofundme.com/f/brazilianscriptguy)
115160

116161
---
117162

118-
© 2026 Luiz Hamilton Silva — BlueTeam-Tools
163+
> 🛡️ _BlueTeam-Tools Suite is engineered for environments where **forensics, response, governance, and auditability converge**._
164+
165+
© 2026 Luiz Hamilton Silva. All rights reserved.

0 commit comments

Comments
 (0)