Pinned Repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
alerting-detection-strategy-framework
A framework for developing alerting and detection strategies for incident response.
All-Things-Postman
A selection of examples using Postman REST Client
amplify-passwordless-sms-auth
amplify passwordless sms authentication
detection-rules
Rules for Elastic Security's detection engine
Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
minemeld-qradar-api
OSINT
Collections of tools and methods created to aid in OSINT collection
poruchikrj's Repositories
poruchikrj/Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
poruchikrj/OSINT
Collections of tools and methods created to aid in OSINT collection
poruchikrj/ato-checklist
A checklist of practices for organizations dealing with account takeover (ATO)
poruchikrj/AutoRemediationAADIP
poruchikrj/awesome-playbooks
A curated repository of incident response playbooks
poruchikrj/aws-customer-playbook-framework
This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.
poruchikrj/AzureAD-incident-response
Notes on responding to security breaches relating to Azure AD
poruchikrj/blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
poruchikrj/blue-teaming-with-kql
Repository with Sample KQL Query examples for Threat Hunting
poruchikrj/cloud-security-remediation-guides
Security Remediation Guides
poruchikrj/detection-engineering-maturity-matrix
poruchikrj/DiagramsShiiet
Diagrams and shiiiet
poruchikrj/Emailidator
Check a Email is Valid or Not
poruchikrj/EVTX-to-MITRE-Attack
Set of EVTX samples (>170) mapped to MITRE Att@k tactic and techniques to measure your SIEM coverage or developed new use cases.
poruchikrj/FalconFriday
Bi-weekly hunting queries
poruchikrj/Get-actionable-Threat-Intelligence-from-Twitter-Jupyter-Notebook
Get actionable Threat Intelligence from Twitter Jupyter Notebook
poruchikrj/hub-and-spoke-playground
A collection of BICEP/ARM templates that deploys on Azure a hub & spoke net topology aligned with Microsoft Enterprise scale landing zone ref architecture to use as playground for test and study. As bonus many scenarios with step-by-step solutions for studying and learning are also available
poruchikrj/IR_Playbooks
poruchikrj/IRPlaybooks
poruchikrj/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
poruchikrj/Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
poruchikrj/One-Liners
A collection of awesome one-liners for bug bounty hunting.
poruchikrj/osint_stuff_tool_collection
A collection of several hundred online tools for OSINT
poruchikrj/PCAP-ATTACK
PCAP Samples for Different Post Exploitation Techniques
poruchikrj/Ransomware-Samples
Small collection of Ransomware organized by family.
poruchikrj/Sentinel-Queries
Collection of KQL queries
poruchikrj/textdistance
Compute distance between sequences. 30+ algorithms, pure python implementation, common interface, optional external libs usage.
poruchikrj/The-Azure-Cloud-Native-Architecture-Mapbook
The Azure Cloud Native Architecture Mapbook, published by Packt
poruchikrj/Threat-Hunting-and-Detection
Repository for threat hunting and detection queries, tools, etc.
poruchikrj/vk_visualizer
vusialization of geo points from photos from vk profile