GirlLily's starred repositories
WALK_WebAssembly_Lure_Krafter
A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims at aiding with initial access during red teams and phishing exercises leveraging WASM smuggling techniques.
detection-rules
Collection of YARA-L 2.0 sample rules for the Chronicle Detection API
Sentinel-Queries
Collection of KQL queries
AzSentinelQueries
Repository with Sentinel Analytics Rules, Hunting Queries and helpful external data sources.
awesome-malware-analysis
Defund the Police.
ghost-usb-honeypot
A honeypot for malware that propagates via USB storage devices
learning-malware-analysis
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
awesome-honeypots
an awesome list of honeypot resources
VelociraptorVQLs
Repository of VQLs for Velociraptor
velociraptor-artifacts
Generic artifacts for multiple Operating Systems to extend the VQL hunts of Velociraptor
Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
Azure-BlueTeam-Toolkit
A collection of KQL queries for running security monitoring in Microsoft Azure using Azure Sentinel and 365 Defender Advanced Hunting.
awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
azure-sdk-for-python
This repository is for active development of the Azure SDK for Python. For consumers of the SDK we recommend visiting our public developer docs at https://learn.microsoft.com/python/azure/ or our versioned developer docs at https://azure.github.io/azure-sdk-for-python.
cic-ids-2018-intrusion-detection-classification
Baseline experiments on training a Decision Tree Classifier and a Random Forest Classifier using Grid Search with Cross Validation on the CIC IDS 2018 dataset for training Machine Learning network intrusion detection classifier models.
Anomaly-Detection-KDD99-CNNLSTM
Intrusion Detection System using Machine Learning and Deep Learning
Intrusion-Detection-System
IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including perhaps insider.
nist-data-mirror
A simple Java command-line utility to mirror the CVE JSON data from NIST.
ansible-azure-rm-resource
Ansible module to manage Azure resources
cloud.azure_ops
Ansible Roles for managing Azure Resources
yarAnalyzer
Yara Rule Analyzer and Statistics