Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
Here is a list of resources broken down by topic that I either reference, use, or have researched.
My Personal GitHub Repos
This repository contains a set of scripts designed to enhance the security of Linux systems. These scripts are designed for blue teams during security competitions or for anyone looking to implement stringent security measures on their Linux systems. They are designed for my personal needs and may not meet your own.
A PowerShell script for rapid initial incident response data collection on a potentially breached Windows system.
This PowerShell script is designed to perform rapid initial data collection on a potentially breached Windows system. It focuses on security, efficiency, and speed to gather crucial information during the early stages of an incident response process.
AI Tools and models
Many different GPTs available for a wide array of tasks.
Your friendly assistant. Fast, capable, and truly conversational.
Generates images based on prompts.
Various Cybersecurity Resources
Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.
This is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology
YARA is a multi-platform program running on Windows, Linux and Mac OS X.
IDA Pro as a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation.
Zero Miss for Office Malware Threats
Immunity Debugger is a dynamic analysis tool that allows executables to be analyzed at the assembly language level with reverse engineering techniques.
Hands-on SOC Analyst training
The Splunk Attack Range is an open-source project maintained by the Splunk Threat Research Team. It builds instrumented cloud and local environments, simulates attacks, and forwards the data into a Splunk instance.
The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data.
It will list MX records for a domain in priority order.
Great tool for monitoring the system and detecting suspicious situations. It’s also free.
Procmon tool is a useful tool that provides real-time information by monitoring the activities of processes on Windows.
https://learn.microsoft.com/tr-tr/sysinternals/downloads/procmon
Volatility is a tool that enables the analysis of memory dumps taken from a compromised machine during the incident response process.
Wireshark is a tool that allows capturing, analyzing, and recording network packets passing through network interfaces on the system.
It gives you the history of different browsers in one table.
Tools listed are just resources and no guarantee of your safety or usefulness of tools is implied. Use at your own risk.
Sign up to get summaries and communications!