Pinned Repositories
haids_splunk_security
Various ways to gather intelligence from an organization's Splunk data
kql_azure_data_explore
KQL Queries to aid in security investigations within Azure Data Explore Databases.
logscale_hunt_queries
Logscale queries to aid in Threat Hunting with Crowdstrike
PowerShellSecurityOps
For automating common day to day tasks
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
PS_auditing
looks for expired accounts, inactive accounts, password not set, etc.
snort
what pigs do
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Sparrow
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
haidon603's Repositories
haidon603/haids_splunk_security
Various ways to gather intelligence from an organization's Splunk data
haidon603/PowerShellSecurityOps
For automating common day to day tasks
haidon603/Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
haidon603/kql_azure_data_explore
KQL Queries to aid in security investigations within Azure Data Explore Databases.
haidon603/logscale_hunt_queries
Logscale queries to aid in Threat Hunting with Crowdstrike
haidon603/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
haidon603/PS_auditing
looks for expired accounts, inactive accounts, password not set, etc.
haidon603/snort
what pigs do
haidon603/Sparrow
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.