iToxic's starred repositories
ISC2-CC-Dump-Questions-Study-Material
The content in this repo is based on the self-paced course called Certified in Cybersecurity from (ISC)2, which is a preparation for (ISC)2 Certified in Cybersecurity. And Also Dump Question which will help student to get better preparaion for this vendor examination.
MDE-DFIR-Resources
A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more.
Computer-forensics
The best tools and resources for forensic analysis.
SIGMA-Resources
Resources To Learn And Understand SIGMA Rules
ThreatHunting-Keywords-sigma-rules
Sigma detection rules for hunting with the threathunting-keywords project
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
LinuxCheatSheet
Linux Cheat Sheet
Hunting-Queries-Detection-Rules
KQL Queries. Microsoft Defender, Microsoft Sentinel
AzureSentinel
Sharing my KQL queries for Azure Sentinel
DefenderATPQueries
Hunting Queries for Defender ATP
reversinglabs-siem-rules
A collection of various SIEM rules relating to malware family groups.
CYSA-Study-Guide
Notes I took to prepare for the CompTIA CySA+ exam (CS1-003 Beta)
SentinelKQL
Azure Sentinel KQL
MustLearnKQL
Code included as part of the MustLearnKQL blog series
FalconFriday
Hunting queries and detections
Sentinel-Queries
Collection of KQL queries
Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.