iToxic's starred repositories
SIGMA-Resources
Resources To Learn And Understand SIGMA Rules
ThreatHunting-Keywords-sigma-rules
Sigma detection rules for hunting with the threathunting-keywords project
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
LinuxCheatSheet
Linux Cheat Sheet
Hunting-Queries-Detection-Rules
KQL Queries. Microsoft Defender, Microsoft Sentinel
AzureSentinel
Sharing my KQL queries for Azure Sentinel
DefenderATPQueries
Hunting Queries for Defender ATP
reversinglabs-siem-rules
A collection of various SIEM rules relating to malware family groups.
CYSA-Study-Guide
Notes I took to prepare for the CompTIA CySA+ exam (CS1-003 Beta)
SentinelKQL
Azure Sentinel KQL
MustLearnKQL
Code included as part of the MustLearnKQL blog series
FalconFriday
Hunting queries and detections
Sentinel-Queries
Collection of KQL queries
Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
Nucleimonst3r
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
SOC-OpenSource
This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC architecture.
SOC-Multitool
A powerful and user-friendly browser extension that streamlines investigations for security professionals.