theaj42
Data is cool. Especially if it's CTI. *Especially* if it's *huntable* CTI.
https://www.linkedin.com/in/ajvanbeest/Chicagoland
Pinned Repositories
altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
awesome-threat-detection
A curated list of awesome threat detection and hunting resources
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
CTI-Feed-Collector
Open Source Cyber Threat Intelligence Feed Collector
ctifeeds
Cyber Threat Intelligence Feeds
Data-Engineering-HowTo
A list of useful resources to learn Data Engineering from scratch
dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
gitleaks
Scan git repos (or files) for secrets using regex and entropy 🔑
malicious_chrome_extensions
A list of malicious Chrome extensions
presentations
theaj42's Repositories
theaj42/presentations
theaj42/malicious_chrome_extensions
A list of malicious Chrome extensions
theaj42/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
theaj42/altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
theaj42/awesome-threat-detection
A curated list of awesome threat detection and hunting resources
theaj42/CTI-Feed-Collector
Open Source Cyber Threat Intelligence Feed Collector
theaj42/ctifeeds
Cyber Threat Intelligence Feeds
theaj42/Data-Engineering-HowTo
A list of useful resources to learn Data Engineering from scratch
theaj42/dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
theaj42/gitleaks
Scan git repos (or files) for secrets using regex and entropy 🔑
theaj42/CobaltStrike
CobaltStrike's source code
theaj42/Hunting-New-Registered-Domains
Hunting Newly Registered Domains
theaj42/ioc-explorer
Explore Indicators of Compromise Automatically
theaj42/Keyboard-360Pro
My fork of the Kenisis Keyboard firmware
theaj42/masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
theaj42/omnibus
The OSINT Omnibus (beta release)
theaj42/phishing_catcher
Phishing catcher using Certstream
theaj42/pihole-updatelists
Update Pi-hole's lists from remote sources easily
theaj42/playing-with-git
Git practice zone. Unstable; prone to change. Possibly fun.
theaj42/PoshSec
PoshSec PowerShell Module
theaj42/PowerMeta
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonly found in metadata are usernames, domains, software titles, and computer names.
theaj42/python-iocextract
Defanged Indicator of Compromise (IOC) Extractor.
theaj42/RansomwareSimulator
Powershell script to emulate the "blast radius" of a ransomware infection.
theaj42/RobotsDisallowed
A curated list of the most common and most interesting robots.txt disallowed directories.
theaj42/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
theaj42/security-apis
A collective list of public APIs for use in security. Contributions welcome
theaj42/security_content
Splunk Security Content
theaj42/vFeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
theaj42/Yara-Rules
Repository of YARA rules made by McAfee Enterprise ATR Team