Mehmet E.'s repositories
Threat-Hunting-and-Detection
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
Cheat-Sheets
Cheat sheets for threat hunting, detection and other stuff.
malware_training_vol1
Materials for Windows Malware Analysis training (volume 1)
Microsoft-M365D-Hunting-Queries
Sample queries for Advanced hunting in Microsoft Threat Protection
Real-CyberSecurity-Datasets
Public datasets to help you address various cyber security problems.
attack-flow
ATT&CK Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
labs_modern_malware_c2
labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.
TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Alcatraz
x64 binary obfuscator
azure-docs
Open source documentation of Microsoft Azure
cobaltstrike-beacon-data
Open Dataset of Cobalt Strike Beacon metadata (2018-2022)
dataexplorer-docs
Azure Data Explorer
ds4n6_lib
Library of functions to apply Data Science in several forensics artifacts
forensic_as_code
peregrinations at the frontier of forensic and data science
fr0ggers-jupyter-collection
Collection of Jupyter Notebooks by @fr0gger_
GHOSTS
GHOSTS is a realistic user simulation framework for cyber simulation, training, and exercise
ipython-magics
SecureWorks' Infosec Jupyterthon IPython Magics talk
Streamlit_Course
Here you can find all the material for the O'Reilly Streamlit Course
taegis-threat-hunting-tutorials
Threat Hunting with Jupyter Notebooks on Taegis