Skip to content
View r1skkam's full-sized avatar

Block or report r1skkam

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Blue Team

30Aug22Tue
34 repositories

Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR

PowerShell 224 29 Updated Feb 18, 2025

The Hunting ELK

Jupyter Notebook 3,794 689 Updated Jun 1, 2024

You didn't think I'd go and leave the blue team out, right?

1,640 244 Updated Sep 19, 2023

Detect Tactics, Techniques & Combat Threats

SCSS 2,115 341 Updated Jan 29, 2025

Collection of walkthroughs on various threat hunting techniques

HTML 75 19 Updated Aug 3, 2020

Malware samples, analysis exercises and other interesting resources.

HTML 1,515 230 Updated Jan 13, 2024

Some important DFIR Resources

83 14 Updated Mar 16, 2023
Python 2,042 526 Updated Feb 19, 2025

Built-in Panther detection rules and policies

Python 360 180 Updated Feb 19, 2025

Tools and Techniques for Blue Team / Incident Response

2,959 457 Updated Apr 2, 2024

YARA signature and IOC database for my scanners and tools

YARA 2,554 613 Updated Feb 15, 2025

evtx2json extracts events of interest from event logs, dedups them, and exports them to json.

Python 41 7 Updated May 3, 2021

Windows Shortcut file (LNK) parser

Python 81 13 Updated May 19, 2024

Windows Shortcut file (LNK) parser

Python 135 26 Updated Nov 17, 2022

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Jinja 2,223 371 Updated Feb 19, 2025

Sysmon configuration file template with default high-quality event tracing

4,896 1,727 Updated Jul 3, 2024

Kippo - SSH Honeypot

Python 1,646 278 Updated Nov 19, 2023

The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifa…

HTML 574 47 Updated Nov 13, 2024

BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfigurations to create vulnerable tenants with multiple attack …

Python 438 25 Updated Feb 18, 2025

Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io

Python 11 1 Updated Jun 25, 2020
JavaScript 16 1 Updated Feb 5, 2025

Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders

JavaScript 791 84 Updated Oct 5, 2023

Cover various security approaches to attack techniques and also provides new discoveries about security breaches.

PowerShell 461 74 Updated Jan 19, 2025

Write fuzzer with rust

Rust 202 28 Updated Sep 9, 2023

Practical Windows Forensics Training

PowerShell 644 115 Updated Feb 29, 2024

WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.

HTML 156 12 Updated Oct 28, 2024

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

PowerShell 6,914 956 Updated Feb 18, 2025

An advanced memory forensics framework

Python 7,526 1,301 Updated Jun 14, 2023