Hamza M'hirsi (HamzaMhirsi)

HamzaMhirsi

Geek Repo

Company:Rakuten Symphony

Location:Germany

Home Page:https://hamzamhirsi.medium.com

Twitter:@HirsiHamza

Github PK Tool:Github PK Tool

Hamza M'hirsi's starred repositories

Azure-Sentinel

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

Language:Jupyter NotebookLicense:MITStargazers:4412Issues:0Issues:0

invoke-atomicredteam

Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.

Language:PowerShellLicense:MITStargazers:802Issues:0Issues:0

Spider

Python website crawler.

Stargazers:1Issues:0Issues:0

TLS-SSL_IOC

A python script extracts SSL/TLS IOC from malicious pcap files, the script will order the session one by one, make sure to filter the pcap and extract only malicious session before you use the script. You use this website to get a malicious pcap file https://www.malware-traffic-analysis.net.

Language:PythonStargazers:6Issues:0Issues:0

A-Red-Teamer-diaries

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

Stargazers:3Issues:0Issues:0

Spider

Python website crawler.

Language:PythonStargazers:963Issues:0Issues:0

PayloadsAllTheThings

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Language:PythonLicense:MITStargazers:58635Issues:0Issues:0

domain_footprint

project from 2000-ish that never got the attention it needed. Basically uses whois to gather intel on a target...

Language:Perl 6Stargazers:1Issues:0Issues:0

TLS-tshark-and-Threat-Intel

In this repository we will catch some fields on TLS traffic, and use Threat Intel to detect if the packets received

Language:PythonStargazers:4Issues:0Issues:0