Lists (9)
Sort Name ascending (A-Z)
Incident Response Docs
IR tools
M365, Microsoft, CloudQOL
Reverse Engineering
Secure Architecture
Testing - Blue Team
Testing - Purple Team
Testing - Red Team
pentesting, attack emulation, MITRE ATTACK, adversary emulationStars
Digital Forensics artifact repository
Tesseract Open Source OCR Engine (main repository)
An informational repo about hunting for adversaries in your IT environment.
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Digital Forensics Artifacts Knowledge Base
A curated list of tools for incident response
A very simple way to find out which SSL ciphersuites are supported by a target.
Some results of my DGA reversing efforts
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD…
A toolkit for the post-mortem examination of Docker containers from forensic HDD copies
A Collection of application ideas which can be used to improve your coding skills.
😎 Awesome lists about all kinds of interesting topics
A curated list of awesome JSON datasets that don't require authentication.
Menu driven, user friendly tool for setting up a simple AD lab in Azure
This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)
Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)
The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the host system. Created for incident response Team.
Indicators of Compromises (IOC) of our various investigations
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.
A repository to share publicly available Velociraptor detection content
A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.