Steve J.'s repositories
Bash-Oneliner
A collection of handy Bash One-Liners and terminal tricks
aad-app-credential-tools
Tooling for application credentials
ATT-Fiber-Check
script to check where Fiber is available
azure-marketplace-management-extras
Azure policy compliance state function app
Azure.Policy.Demos
Azure Policies examples
blue-team-wiki
Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries
books-mmm-booknotes
Notes from books and other interesting things that I've read. Table of contents at the end 👇
Community-Policy
This repo is for Microsoft Azure customers and Microsoft teams to collaborate in making custom policies.
CRT
Contact: CRT@crowdstrike.com
devops-governance
Example end-to-end Governance Model from CI/CD to Azure Resource Manager. Use this project to deploy example AAD, ARM and Azure DevOps resources to learn about e2e RBAC.
dotfiles-1
:wrench: .files, including ~/.macos — sensible hacker defaults for macOS
enketo-express-forked
The NEW Enketo. A super light-weight node.js version of Enketo Smart Paper.
enterprise-azure-policy-as-code
Enterprise-ready Azure Policy-as-Code (PaC) solution (includes Az DevOps pipeline)
Fireeye_Red_CVE_Tenable_countermeasures
List of CVEs that should be addressed to limit the effectiveness of the Red Team tools per FireEye and corresponding Tenable Plugin IDs
nist-demo-2022
Demo delivered at the 2022 ZTA and DevSecOps for Cloud Native Applications NIST conference
pdf-gimme
Remove password encryption from PDF documents if you already know the password.
PSHero
Powershell scripts for DFIR and automation
security-stack-mappings
This project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
terraform-azurerm-caf
Terraform supermodule for the Terraform platform engineering for Azure
terraform-on-azure-cloud
Terraform on AWS with SRE & IaC DevOps | Real-World 20 Demos
ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
vti-dorks
Awesome VirusTotal Intelligence Search Queries
webcrypto-examples
Web Cryptography API Examples Demo: https://diafygi.github.io/webcrypto-examples/
xml-newsml-g2
XML::NewsML_G2 - generate NewsML-G2 news items
xmldsig
Implementation of the xmldsig specification http://www.w3.org/TR/xmldsig-core/