Jack Halstead's starred repositories

ESXiAudit

ESXi security configuration audit.

Language:PowerShellLicense:GPL-3.0Stargazers:2Issues:0Issues:0
Language:ShellStargazers:9Issues:0Issues:0

LazyAdmin

SysAdmin scripts for you to use.

Language:JavaScriptLicense:MITStargazers:565Issues:0Issues:0
Language:PowerShellStargazers:12Issues:0Issues:0

Trawler

PowerShell script to help Incident Responders discover potential adversary persistence mechanisms.

Language:PowerShellLicense:MITStargazers:298Issues:0Issues:0

BlueTeam-Tools

Tools and Techniques for Blue Team / Incident Response

Stargazers:2555Issues:0Issues:0

untitledgoosetool

Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.

Language:PythonLicense:CC0-1.0Stargazers:900Issues:0Issues:0

ChopChopGo

Rapidly Search and Hunt through Linux Forensics Artifacts

Language:GoLicense:GPL-3.0Stargazers:173Issues:0Issues:0

EventFinder2

Finds event logs between two time points. Useful for helpdesk/support/malware analysis.

Language:C#License:GPL-3.0Stargazers:43Issues:0Issues:0

SecLists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Language:PHPLicense:MITStargazers:55795Issues:0Issues:0

pointer

Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.

Language:GoLicense:GPL-3.0Stargazers:65Issues:0Issues:0

ESXiTri

ESXi Cyber Security Incident Response Script

Language:ShellLicense:GPL-3.0Stargazers:18Issues:0Issues:0

melting-cobalt

A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object

Language:PythonLicense:Apache-2.0Stargazers:163Issues:0Issues:0

talks

Presentation materials for talks I've given.

License:GPL-3.0Stargazers:20Issues:0Issues:0

IOK

IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics

Language:GoLicense:ODbL-1.0Stargazers:152Issues:0Issues:0
Language:PythonLicense:MITStargazers:34Issues:0Issues:0
Language:PythonLicense:MITStargazers:166Issues:0Issues:0

InfraHunter

Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.

Language:PythonStargazers:57Issues:0Issues:0

Crypto-OpSec-SelfGuard-RoadMap

Here we collect and discuss the best DeFi, Blockchain and crypto-related OpSec researches and data terminals - contributions are welcome.

License:UnlicenseStargazers:1401Issues:0Issues:0

udemy-downloader

A Udemy downloader that can download DRM protected videos and non-DRM protected videos.

License:MITStargazers:3Issues:0Issues:0

phishing_kits

Exposing phishing kits seen from phishunt.io

Stargazers:191Issues:0Issues:0

APT_REPORT

Interesting APT Report Collection And Some Special IOC

Language:PythonStargazers:2288Issues:0Issues:0
Language:PythonStargazers:154Issues:0Issues:0

DFIRPowerShellScripts

Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!

Language:PowerShellLicense:MITStargazers:40Issues:0Issues:0

IRM

Incident Response Methodologies 2022

License:NOASSERTIONStargazers:894Issues:0Issues:0

Sparrow

Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.

Language:PowerShellLicense:CC0-1.0Stargazers:1406Issues:0Issues:0

awesome-security-hardening

A collection of awesome security hardening guides, tools and other resources

Stargazers:5210Issues:0Issues:0

Business-Email-Compromise-Guide

The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.

Stargazers:217Issues:0Issues:0

adsec

An introduction to Active Directory security

Language:PowerShellLicense:BSD-3-ClauseStargazers:633Issues:0Issues:0