Angelo T. Aschert's starred repositories
Taranis-NG
Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains a user portal for simple self asset management. Taranis NG was developed by SK-CERT with a help from wide CSIRT community.
prowler
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
Linux-Incident-Response
practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response
Azure-Sentinel-Notebooks
Interactive Azure Sentinel Notebooks provides security insights and actions to investigate anomalies and hunt for malicious behaviors.
yara-forge
Automated YARA Rule Standardization and Quality Assurance Tool
god-mode-rules
God Mode Detection Rules
gsvsoc_cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Open-Source-YARA-rules
YARA Rules I come across on the internet
Yara-Rules
Repository of Yara Rules
threat-intel
Signatures and IoCs from public Volexity blog posts.
malware-ioc
Indicators of Compromises (IOC) of our various investigations
detections
A home for detection content developed by the delivr.to team
yara-rules
Collection of YARA signatures from individual research
reversinglabs-yara-rules
ReversingLabs YARA Rules
YARA-rules
Some YARA rules i will add from time to time
DefenderHarvester
Expose a lot of MDE telemetry that is not easily accessible in any searchable form
Bug-bounty
Ressources for bug bounty hunting
FalconHound
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool.
A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
CyberSecurityRoadmapSuggestions
This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌
awesome-list
Cybersecurity oriented awesome list
Domain-Response
Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automated phishing domain investigations. However it can be used for every domain to gather all domain information needed. This can help to classify if a domain is malicious.