00gxd14g
#threathunting engineer . Fan of #opensource | #sysmon | #SIGMA | #EDR | #Offensive / #RedTeam | #BlueTeam
@0gxd14gİstanbul
Pinned Repositories
00gxd14g
adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
APT06202001
Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020
atomic-red-team-pandas
This project is a Python script used to process a dataset containing Windows attack techniques. The dataset is extracted from a YAML file, which includes information about the attack techniques, tactics, and associated attack commands. The script converts the YAML file into a Pandas DataFrame for further analysis and manipulation.
CTI
CTI
ir-rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
McAfeeESM_TheHive
With this script, you can automatically send the alarms that occur on "McAfee SIEM" to the "TheHive" platform, the alarms you send will be automatically opened as a case.
misp-extractor
This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, and hashes). The retrieved attributes are then written to separate files.
robots.txt_scanner
Web platform crawler robots.txt
Shell-Finder
Scan All HTTP 200 OK SHELL Finder
00gxd14g's Repositories
00gxd14g/misp-extractor
This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, and hashes). The retrieved attributes are then written to separate files.
00gxd14g/00gxd14g
00gxd14g/atomic-red-team-pandas
This project is a Python script used to process a dataset containing Windows attack techniques. The dataset is extracted from a YAML file, which includes information about the attack techniques, tactics, and associated attack commands. The script converts the YAML file into a Pandas DataFrame for further analysis and manipulation.
00gxd14g/kekobuster
kekobuster
00gxd14g/McAfeeESM_TheHive
With this script, you can automatically send the alarms that occur on "McAfee SIEM" to the "TheHive" platform, the alarms you send will be automatically opened as a case.
00gxd14g/adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
00gxd14g/APT06202001
Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020
00gxd14g/CTI
CTI
00gxd14g/ir-rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
00gxd14g/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
00gxd14g/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
00gxd14g/awesome-threat-detection
A curated list of awesome threat detection and hunting resources
00gxd14g/caldera_v5.2
Automated Adversary Emulation Platform
00gxd14g/calderav
00gxd14g/draft_cmd
00gxd14g/esm2markdown
esm2markdown 0gxd14g
00gxd14g/flightsim
A utility to safely generate malicious network traffic patterns and evaluate controls.
00gxd14g/IntelOwl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
00gxd14g/magma
MITRE Caldera's user interface plugin powered by VueJS
00gxd14g/McAfee-MVISION-EDR-Integrations
Collection of various MVISION EDR Integration Scripts
00gxd14g/MISP-TAXII-Forwarder
MISP to TAXII STIX Forwarder
00gxd14g/misp-website
MISP website (hugo-based)
00gxd14g/net_config
00gxd14g/Network-Config
00gxd14g/OpticsBuilder
Install Threat Optics
00gxd14g/portscantemp
00gxd14g/shell-backdoor
all shell backdoor in the world
00gxd14g/SOAR
00gxd14g/Threat_Hunting
Some Threat Hunting queries useful for blue teamers
00gxd14g/Training
Defensive Origins Training Schedule