Mehmet E. (Cyb3r-Monk)

Cyb3r-Monk

Geek Repo

Location:Netherlands

Twitter:@Cyb3rMonk

Github PK Tool:Github PK Tool


Organizations
AppliedPurpleTeaming

Mehmet E.'s repositories

Threat-Hunting-and-Detection

Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).

Language:Jupyter NotebookLicense:BSD-3-ClauseStargazers:561Issues:29Issues:4

RITA-J

Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.

Language:Jupyter NotebookLicense:GPL-3.0Stargazers:188Issues:18Issues:1

ACCD

Active C&C Detector

Language:Jupyter NotebookLicense:GPL-3.0Stargazers:143Issues:4Issues:0

Cheat-Sheets

Cheat sheets for threat hunting, detection and other stuff.

Spartacus

Spartacus DLL Hijacking Discovery Tool

Language:C#License:MITStargazers:5Issues:0Issues:0

malware_training_vol1

Materials for Windows Malware Analysis training (volume 1)

Language:AssemblyStargazers:3Issues:0Issues:0

socbed

A Self-Contained Open-Source Cyberattack Experimentation Testbed

Language:PythonLicense:GPL-3.0Stargazers:3Issues:0Issues:0

Microsoft-M365D-Hunting-Queries

Sample queries for Advanced hunting in Microsoft Threat Protection

Language:Jupyter NotebookLicense:MITStargazers:2Issues:0Issues:0

Real-CyberSecurity-Datasets

Public datasets to help you address various cyber security problems.

Stargazers:2Issues:0Issues:0

attack-flow

ATT&CK Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.

Language:VueLicense:Apache-2.0Stargazers:1Issues:0Issues:0

Blackout

kill anti-malware protected processes using BYOVD

Language:C++Stargazers:1Issues:0Issues:0
Language:C#License:MITStargazers:1Issues:0Issues:0
Language:Jupyter NotebookStargazers:1Issues:0Issues:0

labs_modern_malware_c2

labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.

Language:HTMLStargazers:1Issues:0Issues:0

msticpy

Microsoft Threat Intelligence Security Tools

Language:PythonLicense:NOASSERTIONStargazers:1Issues:0Issues:0

TripleCross

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

Language:CLicense:GPL-3.0Stargazers:1Issues:0Issues:0

Alcatraz

x64 binary obfuscator

Language:C++Stargazers:0Issues:0Issues:0

azure-docs

Open source documentation of Microsoft Azure

License:CC-BY-4.0Stargazers:0Issues:0Issues:0
Language:Jupyter NotebookLicense:Apache-2.0Stargazers:0Issues:0Issues:0

cobaltstrike-beacon-data

Open Dataset of Cobalt Strike Beacon metadata (2018-2022)

Language:Jupyter NotebookStargazers:0Issues:0Issues:0

dataexplorer-docs

Azure Data Explorer

License:CC-BY-4.0Stargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:0Issues:0

ds4n6_lib

Library of functions to apply Data Science in several forensics artifacts

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

forensic_as_code

peregrinations at the frontier of forensic and data science

Language:Jupyter NotebookStargazers:0Issues:0Issues:0

fr0ggers-jupyter-collection

Collection of Jupyter Notebooks by @fr0gger_

Language:HTMLStargazers:0Issues:0Issues:0

GHOSTS

GHOSTS is a realistic user simulation framework for cyber simulation, training, and exercise

Language:C#License:NOASSERTIONStargazers:0Issues:0Issues:0

ipython-magics

SecureWorks' Infosec Jupyterthon IPython Magics talk

Language:Jupyter NotebookLicense:Apache-2.0Stargazers:0Issues:0Issues:0
Language:PowerShellStargazers:0Issues:0Issues:0

Streamlit_Course

Here you can find all the material for the O'Reilly Streamlit Course

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

taegis-threat-hunting-tutorials

Threat Hunting with Jupyter Notebooks on Taegis

Language:Jupyter NotebookLicense:Apache-2.0Stargazers:0Issues:0Issues:0