Jack Halstead's starred repositories
BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
untitledgoosetool
Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.
ChopChopGo
Rapidly Search and Hunt through Linux Forensics Artifacts
EventFinder2
Finds event logs between two time points. Useful for helpdesk/support/malware analysis.
melting-cobalt
A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
InfraHunter
Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.
Crypto-OpSec-SelfGuard-RoadMap
Here we collect and discuss the best DeFi, Blockchain and crypto-related OpSec researches and data terminals - contributions are welcome.
udemy-downloader
A Udemy downloader that can download DRM protected videos and non-DRM protected videos.
phishing_kits
Exposing phishing kits seen from phishunt.io
APT_REPORT
Interesting APT Report Collection And Some Special IOC
DFIRPowerShellScripts
Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.