Fulco’s Notes
Fulco’s Notes
  • Home
  • Fulco’s Notes
  • Through the AI Lens
  • Resources
  • More
    • Home
    • Fulco’s Notes
    • Through the AI Lens
    • Resources
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out


Signed in as:

filler@godaddy.com

  • Home
  • Fulco’s Notes
  • Through the AI Lens
  • Resources

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Welcome

Here is a list of resources broken down by topic that I either reference, use, or have researched.

Resources

My Repos

My Personal GitHub Repos

Blue Linux Bastion: Linux System Hardening Scripts

This repository contains a set of scripts designed to enhance the security of Linux systems. These scripts are designed for blue teams during security competitions or for anyone looking to implement stringent security measures on their Linux systems. They are designed for my personal needs and may not meet your own. 

https://github.com/fulco/BlueLinuxBastion

Blue Windows Triage: Rapid Windows Response

A PowerShell script for rapid initial incident response data collection on a potentially breached Windows system.

This PowerShell script is designed to perform rapid initial data collection on a potentially breached Windows system. It focuses on security, efficiency, and speed to gather crucial information during the early stages of an incident response process.

https://github.com/fulco/BlueWindowsTriage


AI

AI Tools and models

Chat GPT

Many different GPTs available for a wide array of tasks.

https://chat.openai.com/

Claude.ai

Your friendly assistant. Fast, capable, and truly conversational. 

https://claude.ai/

Ideogram.ai

Generates images based on prompts.

https://ideogram.ai/


Cybersecurity

Various Cybersecurity Resources

Virustotal

Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community. 

https://virustotal.com/

Hybrid Analysis

This is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology 

https://www.hybrid-analysis.com/

Yara

YARA is a multi-platform program running on Windows, Linux and Mac OS X. 

https://virustotal.github.io/yara/

IDA

IDA Pro as a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation. 

https://hex-rays.com/ida-pro/

DOCGuard

Zero Miss for Office Malware Threats 

https://www.docguard.io/

Immunity Debugger

 Immunity Debugger is a dynamic analysis tool that allows executables to be analyzed at the assembly language level with reverse engineering techniques. 

https://www.immunityinc.com/products/debugger/

LetsDefend

Hands-on SOC Analyst training 

https://letsdefend.io/

attack_range

The Splunk Attack Range is an open-source project maintained by the Splunk Threat Research Team. It builds instrumented cloud and local environments, simulates attacks, and forwards the data into a Splunk instance. 

https://github.com/splunk/attack_range

BlueTeam.Lab

The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data. 

https://github.com/op7ic/BlueTeam.Lab

MXToolbox

It will list MX records for a domain in priority order. 

https://mxtoolbox.com/

ProcessHacker

Great tool for monitoring the system and detecting suspicious situations. It’s also free. 

https://processhacker.sourceforge.io/

Procmon

Procmon tool is a useful tool that provides real-time information by monitoring the activities of processes on Windows. 

https://learn.microsoft.com/tr-tr/sysinternals/downloads/procmon

Volatility

Volatility is a tool that enables the analysis of memory dumps taken from a compromised machine during the incident response process. 

https://www.volatilityfoundation.org/

Wireshark

Wireshark is a tool that allows capturing, analyzing, and recording network packets passing through network interfaces on the system. 

https://www.wireshark.org/

BrowsingHistoryView

It gives you the history of different browsers in one table.

https://www.nirsoft.net/utils/browsing_history_view.html

Tools listed are just resources and no guarantee of your safety or usefulness of tools is implied. Use at your own risk.

Subscribe

Sign up to get summaries and communications!

Welcome to Fulco’s Notes

Buy me a drink

Copyright © 2024 Jason Britton  - All Rights Reserved.

Navigating Cybersecurity, AI, and Intel

  • Fulco’s Notes
  • Through the AI Lens
  • Resources

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept