IvanM's repositories
A-Course-on-Digital-Forensics
A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University
AdGuardHome
Network-wide ads & trackers blocking DNS server
ALFA
ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit logs and to perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
awesome-appsec
A curated list of resources for learning about application security
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-detection-engineering
A list of useful Detection Engineering-related resources.
awesome-kubernetes-security
A curated list of awesome Kubernetes security resources
awesome-kubernetes-threat-detection
A curated list of resources about detecting threats and defending Kubernetes systems.
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
detection-rules
Rules for Elastic Security's detection engine
Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
fleet
The premier osquery fleet manager.
helm-chart
helm-chart
IRM
Incident Response Methodologies 2022
macOS-iOS-system-security
Here is some resources about macOS/iOS system security.
osquery
SQL powered operating system instrumentation, monitoring, and analytics.
pcc_2e
Online resources for Python Crash Course (Second Edition), from No Starch Press
sigma
Generic Signature Format for SIEM Systems
tag-security
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
Threathunting-book
Threat hunting Web Windows AD linux ATT&CK TTPs
timesketch
Collaborative forensic timeline analysis
Wazuh-Rules
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
wireguard-install
WireGuard VPN installer for Linux servers