Kaan Sadik Karadag's starred repositories
pocketbase
Open Source realtime backend in 1 file
alerting-detection-strategy-framework
A framework for developing alerting and detection strategies for incident response.
go_api_boilerplate
🐶Go (Golang)🚀REST / GraphQL API + Postgres boilerplate
awesome_Threat-Hunting
A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.
ransomware-simulator
Ransomware simulator written in Golang
misp-tip-of-the-week
A collection of tips for using MISP.
issue-dashboard
A customizable dashboard for GitHub issues and pull requests, using GitHub Pages and GitHub Actions
go-dependency-injection-example
An example to demonstrate the dependency injection pattern in Go
waybackurls
Fetch all the URLs that the Wayback Machine knows about for a domain
SecCon-Framework
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.
IRM-deprecated
Incident Response Methodologies
Sentinel-Queries
Collection of KQL queries