Pinned Repositories
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
awesome-php-security
Awesome PHP Security Resources πΆππ
awesome-security-analytics
A repo for security analytics & threat hunting resources
awesome-threat-detection
A curated list of awesome threat detection and hunting resources
Awesome-WAF
π₯ A curated list of awesome web-application firewall (WAF) stuff.
awesome-yara
A curated list of awesome YARA rules, tools, and people.
bitscout
Remote forensics meta tool
jmj-uy's Repositories
jmj-uy/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
jmj-uy/awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
jmj-uy/awesome-php-security
Awesome PHP Security Resources πΆππ
jmj-uy/awesome-security-analytics
A repo for security analytics & threat hunting resources
jmj-uy/awesome-threat-detection
A curated list of awesome threat detection and hunting resources
jmj-uy/Awesome-WAF
π₯ A curated list of awesome web-application firewall (WAF) stuff.
jmj-uy/awesome-yara
A curated list of awesome YARA rules, tools, and people.
jmj-uy/bitscout
Remote forensics meta tool
jmj-uy/blue-team-wiki
Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries
jmj-uy/content
Demisto is now Cortex XSOAR. Automate and orchestrate your Security Operations with Cortex XSOAR's ever-growing Content Repository. Pull Requests are always welcome and highly appreciated!
jmj-uy/de4dot
.NET deobfuscator and unpacker.
jmj-uy/DeepBlueCLI
jmj-uy/DidierStevensSuite
Please no pull requests for this repository. Thanks!
jmj-uy/grr
GRR Rapid Response: remote live forensics for incident response
jmj-uy/intelmq-1
IntelMQ is a solution to process data feeds, pastebins, tweets throught a message queue.
jmj-uy/pi-pwnbox-rogueap
Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi β WiFi Hacking Cheatsheets + MindMap :bulb:
jmj-uy/pollen
pollen - A command-line tool for interacting with TheHive
jmj-uy/ProcessSpawnControl
Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launched processes, and gives the analyst the option to either keep the process suspended, or to resume it.
jmj-uy/python-rt
Python interface to Request Tracker API
jmj-uy/Reference-Security-Incident-Taxonomy-Task-Force
The aim of this task force is to enable the CSIRT community in reaching a consensus on a reference taxonomy.
jmj-uy/shellsum
A defense tool - detect web shells in local directories via md5sum
jmj-uy/Training_Materials_Bookmarks
Learn you a book for some infosec good
jmj-uy/WebShell
Webshell && Backdoor Collection
jmj-uy/www-security-assistant
This is bundle of Bash scripts that can help you with malicious IP addresses handling within Apache2 and Ubuntu environment.