damddnd's Stars
LearningKijo/SecurityResearcher-Note
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
cyb3rmik3/MDE-DFIR-Resources
A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more.
farhanashrafdev/90DaysOfCyberSecurity
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
garybushey/SentinelConfigurationToWord
Create a Word document showing your Sentinel configuration
cyb3rmik3/KQL-threat-hunting-queries
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
scipag/HardeningKitty
HardeningKitty - Checks and hardens your Windows configuration
jsa2/caOptics
CA Optics - Azure AD Conditional Access Gap Analyzer
cherdt/fail2ban-blocklist
Block IP addresses provided by blocklist.de via fail2ban
sahanEra/MAC_Changer
MAC Changer [python]
elementalsouls/DumpLSASS
rabobank-cdc/DeTTECT
Detect Tactics, Techniques & Combat Threats
JulianHayward/AzADServicePrincipalInsights
Insights and change tracking on Azure Active Directory Service Principals (Enterprise Applications and Applications)
Vrashabh-Sontakke/Complete_DevOps_Roadmap_2022
cisagov/ScubaGear
Automation to assess the state of your M365 tenant against CISA's baselines
IvanGlinkin/Domain_checker
Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydrattack.com), the main idea of which is, based only on the domain name, find almost all of the subdomains and their top 100 open ports
cisagov/decider
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
rod-trent/MustLearnKQL
Code included as part of the MustLearnKQL blog series
toniblyx/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
A-poc/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
A-poc/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
hashishrajan/cloud-security-vulnerabilities
List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Oracle Cloud, IBM Cloud etc
Samsar4/Ethical-Hacking-Labs
Practical Ethical Hacking Labs 🗡🛡
microsoft/ConditionalAccessforZeroTrustResources
ConditionalAccessforZeroTrustResources holding resources for Azure AD CA guidance for Zero Trust
cugu/awesome-forensics
A curated list of awesome forensic analysis tools and resources
msdirtbag/mde
Defender for Endpoint
Kitsun3Sec/Pentest-Cheat-Sheets
A collection of snippets of codes and commands to make your life easier!
MahdiMashrur/Awesome-Application-Security-Checklist
Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application
edoardottt/cariddi
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
dolevshor/azure-orphan-resources
Centralize orphan resources in Azure environments
gtworek/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.