00gxd14g
#threathunting engineer . Fan of #opensource | #sysmon | #SIGMA | #EDR | #Offensive / #RedTeam | #BlueTeam
@0gxd14gİstanbul
Pinned Repositories
00gxd14g
adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
APT06202001
Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020
atomic-red-team-pandas
This project is a Python script used to process a dataset containing Windows attack techniques. The dataset is extracted from a YAML file, which includes information about the attack techniques, tactics, and associated attack commands. The script converts the YAML file into a Pandas DataFrame for further analysis and manipulation.
CTI
CTI
ir-rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
McAfeeESM_TheHive
With this script, you can automatically send the alarms that occur on "McAfee SIEM" to the "TheHive" platform, the alarms you send will be automatically opened as a case.
misp-extractor
This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, and hashes). The retrieved attributes are then written to separate files.
robots.txt_scanner
Web platform crawler robots.txt
Shell-Finder
Scan All HTTP 200 OK SHELL Finder
00gxd14g's Repositories
00gxd14g/robots.txt_scanner
Web platform crawler robots.txt
00gxd14g/Shell-Finder
Scan All HTTP 200 OK SHELL Finder
00gxd14g/aut
autoroot
00gxd14g/mewl
McAfee ESM + Winlogbeat + Logstash
00gxd14g/projects
00gxd14g/sqlmap
sqlmap for windows
00gxd14g/Weevely
ss
00gxd14g/zarp-master