poruchikrj Goto Github PK
Type: User
Type: User
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
A framework for developing alerting and detection strategies for incident response.
A selection of examples using Postman REST Client
amplify passwordless sms authentication
Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
A checklist of practices for organizations dealing with account takeover (ATO)
MITRE ATT&CK Windows Logging Cheat Sheets
A curated list of resources for learning about application security
Curated list of awesome cybersecurity companies and solutions.
A curated list of the most important and useful resources about elasticsearch: articles, videos, blogs, tips and tricks, use cases. All about Elasticsearch!
A curated list of resources related to Industrial Control System (ICS) security.
A curated list of awesome resources related to Mitre ATT&CK™ Framework
:scream: A curated list of amazingly awesome OSINT
A curated repository of incident response playbooks
A collected list of awesome security talks
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
A curated list of awesome YARA rules, tools, and people.
This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.
Azure Sentinel 4 SecOps
Notes on responding to security breaches relating to Azure AD
Official Black Hat Arsenal Security Tools Repository
Repository with Sample KQL Query examples for Threat Hunting
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.