Pinned Repositories
123
A-Course-on-Digital-Forensics
A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University
AdGuardHome
Network-wide ads & trackers blocking DNS server
AdversaryEmulation
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
terraform-lessons
Source Code for Course "Terraform From Beginner to Professional"
joker2013's Repositories
joker2013/123
joker2013/A-Course-on-Digital-Forensics
A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University
joker2013/AdGuardHome
Network-wide ads & trackers blocking DNS server
joker2013/ALFA
ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit logs and to perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework
joker2013/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
joker2013/awesome-appsec
A curated list of resources for learning about application security
joker2013/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
joker2013/awesome-detection-engineering
A list of useful Detection Engineering-related resources.
joker2013/awesome-kubernetes-security
A curated list of awesome Kubernetes security resources
joker2013/awesome-kubernetes-threat-detection
A curated list of resources about detecting threats and defending Kubernetes systems.
joker2013/awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
joker2013/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
joker2013/detection-rules
Rules for Elastic Security's detection engine
joker2013/Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
joker2013/fleet
The premier osquery fleet manager.
joker2013/hacking-books
joker2013/HQ
joker2013/IRM
Incident Response Methodologies 2022
joker2013/macOS-iOS-system-security
Here is some resources about macOS/iOS system security.
joker2013/osquery
SQL powered operating system instrumentation, monitoring, and analytics.
joker2013/pcc_2e
Online resources for Python Crash Course (Second Edition), from No Starch Press
joker2013/pySigma-backend-opensearch
pySigma OpenSearch backend
joker2013/sigma
Generic Signature Format for SIEM Systems
joker2013/tag-security
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
joker2013/TelemetrySource
joker2013/timesketch
Collaborative forensic timeline analysis
joker2013/vpnbot
joker2013/Wazuh-Rules
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
joker2013/wireguard-install
WireGuard VPN installer for Linux servers
joker2013/YubiKey-Guide
Guide to using YubiKey for GnuPG and SSH