2*yo's starred repositories
system-design-101
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
C2IntelFeeds
Automatically created C2 Feeds
awesome-llm-cybersecurity-tools
A curated list of large language model tools for cybersecurity research.
awesome-detection-rules
This is a collection of threat detection rules / rules engines that I have come across.
llm-mistral-invoice-cpu
Data extraction with LLM on CPU
Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
cti-stix2-json-schemas
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
MDTI-Solutions
Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product
Rapports-Techniques
Rapports techniques de VIGINUM
defensive-project-ideas
Ideas for projects for defensive research or blue teaming
pySigma-backend-QRadar-AQL
QRadar AQL backend for converting Sigma rules to QRadar AQL queries
mbc-stix2.1
MBC v3.0 expressed using the STIX 2.1 Malware Behavior Extension