theaj42 Goto Github PK
Name: AJ Van Beest
Type: User
Company: https://www.linkedin.com/in/ajvanbeest/
Bio: Data is cool. Especially if it's CTI. *Especially* if it's *huntable* CTI.
Twitter: ajvanbeest
Location: Chicagoland
Name: AJ Van Beest
Type: User
Company: https://www.linkedin.com/in/ajvanbeest/
Bio: Data is cool. Especially if it's CTI. *Especially* if it's *huntable* CTI.
Twitter: ajvanbeest
Location: Chicagoland
Generates permutations, alterations and mutations of subdomains and then resolves them
A curated list of awesome threat detection and hunting resources
A curated list of Awesome Threat Intelligence resources
CobaltStrike's source code
Open Source Cyber Threat Intelligence Feed Collector
Cyber Threat Intelligence Feeds
A list of useful resources to learn Data Engineering from scratch
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Scan git repos (or files) for secrets using regex and entropy 🔑
Hunting Newly Registered Domains
Explore Indicators of Compromise Automatically
My fork of the Kenisis Keyboard firmware
A list of malicious Chrome extensions
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
The OSINT Omnibus (beta release)
Phishing catcher using Certstream
Update Pi-hole's lists from remote sources easily
Git practice zone. Unstable; prone to change. Possibly fun.
PoshSec PowerShell Module
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonly found in metadata are usernames, domains, software titles, and computer names.
Defanged Indicator of Compromise (IOC) Extractor.
Powershell script to emulate the "blast radius" of a ransomware infection.
A curated list of the most common and most interesting robots.txt disallowed directories.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
A collective list of public APIs for use in security. Contributions welcome
Splunk Security Content
The Correlated CVE Vulnerability And Threat Intelligence Database API
Repository of YARA rules made by McAfee Enterprise ATR Team
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.