🏠
Working from home
Threat Hunting - DFIR - Detection Engineering
Highlights
- Pro
- 🔭 Threat Hunting
- 💡 Detection Engineering Tips
- 📰 Detection Lists
- 🔍 DFIR Artifacts Insights
- 🧛 Purple Teaming
- 🗄️ Event Logs Analysis
- 📜My Detection Lists for SOC/DFIR
- 🧪PurpleTeam scripts and notes
- 👁️LOLC2
- 🆔BADGUIDs
- 🕳️SINKHOLED
- 📖Threat Intelligence Reports Database
- 🐾Threat Hunting artifacts
- Threat Hunting - Suspicious Named pipes
- Event Log Manipulations - Time slipping
- Threat Hunting - Suspicious Service names
- Threat Hunting - Suspicious User-agents
- Detecting DNS over HTTPS
- Threat Hunting - Suspicious TLDs
- OSINT - Catching my hacker via leaked datases
- Detecting DLL Hijacking techniques from HijackLibs With Splunk
- How Threat Actors use Pastebin
- Detecting Phishing attempts with DNSTWIST
- File Integrity monitoring with Auditd
- How Threat Actors use Github
- Detecting Browser extensions installations
- C2 Hiding in plain sight
- Detecting PSEXEC and similar tools
- Detecting Phishing attempts with Wetransfer
- Detecting HTML smuggling Phishing attempts
- More content onMedium andTwitter/BlueSky
PinnedLoading
- ThreatHunting-Keywords
ThreatHunting-Keywords PublicAwesome list of keywords and artifacts for Threat Hunting sessions
- ThreatHunting-Keywords-yara-rules
ThreatHunting-Keywords-yara-rules Publicyara detection rules for hunting with the threathunting-keywords project
- ThreatIntel-Reports
ThreatIntel-Reports PublicRaw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
- lolc2/lolc2.github.io
lolc2/lolc2.github.io PubliclolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection
- Purpleteam
Purpleteam PublicPurpleteam scripts simulation & Detection - trigger events for SOC detections
Something went wrong, please refresh the page to try again.
If the problem persists, check theGitHub status page orcontact support.
If the problem persists, check theGitHub status page orcontact support.