Disregard's Stars
juliocesarfort/public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
SigmaHQ/sigma
Main Sigma Rule Repository
salesforce/ja3
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
olafhartong/sysmon-modular
A repository of sysmon configuration modules
ComodoSecurity/openedr
Open EDR public repository
sans-blue-team/DeepBlueCLI
Cloud-Architekt/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
microsoft/Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
cisagov/ScubaGear
Automation to assess the state of your M365 tenant against CISA's baselines
yokoffing/NextDNS-Config
Setup guide for NextDNS, a DoH proxy with advanced capabilities
davehull/Kansa
A Powershell incident response framework
reprise99/Sentinel-Queries
Collection of KQL queries
Bert-JanP/Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
tom-james-watson/breaktimer-app
Manage periodic breaks. Avoid eye-strain and RSI.
blackhillsinfosec/EventLogging
Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.
rod-trent/SentinelKQL
Azure Sentinel KQL
chall32/LDWin
Link Discovery for Windows
CyberShadow/dhcptest
Cross-platform DHCP test client
rzander/sccmclictr
Client Center for Configuration Manager
DefensiveOrigins/AtomicPurpleTeam
Atomic Purple Team Framework and Lifecycle
lithnet/access-manager
Access Manager provides web-based access to local admin (LAPS) passwords, BitLocker recovery keys, and just-in-time administrative access to Windows computers in a modern, secure, and user-friendly way.
michevnew/PowerShell
activecm/rita
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
microsoft/mdatp-xplat
Microsoft Defender for macOS/Linux - config samples, auxiliary tools
tobiasmcvey/kusto-queries
example queries for learning the kusto language
invictus-ir/Blue-team-app-Office-365-and-Azure
DukeNuke3D/ntwrk-clean-and-flat
Free 2D symbols for computer network diagrams based on https://github.com/ecceman/affinity - clean and flat, easily customisable in native Visio stencil format
superman-lopez/monitor-timeouts
Simple bash scrip that uses pings to checks network disconnects
jay0lee/oneTwoOne
Prevent students from logging into other's Chromebook
siliconshecky/KQL-Queries