Pinned Repositories
C2-Domain-Hunting-Adversary-Cluster-Hunting
Research repository for malicious c2 domain widely used in adversarial campaigns
Crowdstrike-Detections
IR-Python-Scripts
This repository provides day-to-day scripts which can be used for IR/SOC process automation or speeding up artifact review process.
Jupyter-Notebooks
This repository contains collection of Jupyter Notebooks designed for top threat actors. First phase of the project involves releasing notebooks for Nation-State actors. Notebooks provides various hypothesis based on known TTP's
sigma
Generic Signature Format for SIEM Systems
SurojitNandi's Repositories
SurojitNandi/C2-Domain-Hunting-Adversary-Cluster-Hunting
Research repository for malicious c2 domain widely used in adversarial campaigns
SurojitNandi/Jupyter-Notebooks
This repository contains collection of Jupyter Notebooks designed for top threat actors. First phase of the project involves releasing notebooks for Nation-State actors. Notebooks provides various hypothesis based on known TTP's
SurojitNandi/IR-Python-Scripts
This repository provides day-to-day scripts which can be used for IR/SOC process automation or speeding up artifact review process.
SurojitNandi/Crowdstrike-Detections
SurojitNandi/sigma
Generic Signature Format for SIEM Systems