Alex G's starred repositories
detection-and-response-pipeline
โจ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. ๐ท ๐
FalconBMS-Alternative-Launcher
Configure and save FalconBMS setup per Joysticks.
aws-secret-sidecar-injector
Kubernetes mutating webhook to fetch secrets from AWS Secrets Manager
vulnerable-code-snippets
Twitter vulnerable snippets
go-coffeeshop
โ A practical event-driven microservices demo built with Golang. Nomad, Consul Connect, Vault, and Terraform for deployment
kubernetes-the-hard-way
Bootstrap Kubernetes the hard way. No scripts.
suricata-language-server
Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auto-completion to your preferred editor once it is configured.
suricata-4-analysts
The Security Analystโs Guide to Suricata
SublimePrettyJson
Prettify/Minify/Query/Goto/Validate/Lint JSON plugin for Sublime Text 3 & 4
TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
effective_pandas_book
Errata and code for Effective Pandas book
90DaysOfDevOps
This repository started out as a learning in public project for myself and has now become a structured learning map for many in the community. We have 3 years under our belt covering all things DevOps, including Principles, Processes, Tooling and Use Cases surrounding this vast topic.
malicious-pdf
๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
EvilSelenium
EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.
BloodHound
Six Degrees of Domain Admin
ScheduleRunner
A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation