yk's starred repositories
DataSurgeon
Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text
logscale-community-content
This repository contains Community and Field contributed content for LogScale
aws-cheatsheet
A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.
AzDetectSuite
A collection of ARM-based detections for Azure/AzureAD based TTPs
Yara-rules
Collection of private Yara rules.
aws-eks-best-practices
A best practices guide for day 2 operations, including operational excellence, security, reliability, performance efficiency, and cost optimization.
security-response-automation
Take automated actions against threats and vulnerabilities.
MemProcFS-Analyzer
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
jupyter-collection
Collection of Jupyter Notebooks by @fr0gger_
PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
concealed_code_execution
Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows
Evtx_Log_Browser
Evtx Log (xml) Browser
awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.