00gxd14g
#threathunting engineer . Fan of #opensource | #sysmon | #SIGMA | #EDR | #Offensive / #RedTeam | #BlueTeam
@0gxd14gİstanbul
00gxd14g's Stars
mitre/caldera
Automated Adversary Emulation Platform
ReconInfoSec/web-traffic-generator
A quick and dirty HTTP/S "organic" traffic generator.
DefensiveOrigins/Training
Defensive Origins Training Schedule
00gxd14g/misp-extractor
This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, and hashes). The retrieved attributes are then written to separate files.
gkhan496/phishing-brute-earthquake
cansuclaire/HackerRank
00gxd14g/atomic-red-team-pandas
This project is a Python script used to process a dataset containing Windows attack techniques. The dataset is extracted from a YAML file, which includes information about the attack techniques, tactics, and associated attack commands. The script converts the YAML file into a Pandas DataFrame for further analysis and manipulation.
00gxd14g/McAfeeESM_TheHive
With this script, you can automatically send the alarms that occur on "McAfee SIEM" to the "TheHive" platform, the alarms you send will be automatically opened as a case.