Skip to content
View elhoim's full-sized avatar

Organizations

@MISP
Block or Report

Block or report elhoim

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

ShellSweeping the evil.

PowerShell 73 3 Updated Jun 24, 2024

A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID

PowerShell 236 28 Updated Jul 25, 2024

Collection of Microsoft Identity Threat Detection and Response resources.

PowerShell 29 4 Updated Jul 1, 2024

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

169 15 Updated Jul 3, 2024

Sample queries and data as part of the Microsoft Press book, The Definitive Guide to KQL

157 15 Updated May 25, 2024

Cover various security approaches to attack techniques and also provides new discoveries about security breaches.

PowerShell 420 69 Updated Jul 28, 2024

Takajō (鷹匠) is a Hayabusa results analyzer.

Nim 65 4 Updated Jul 28, 2024

know the rules that have changed between 2 Sigma rules folder

Python 2 Updated May 27, 2022
Python 17 2 Updated Jul 19, 2024

This repo contains all my personal Sublime Security detection rules.

4 2 Updated Jul 26, 2024

A python utility for creating timestamp heatmaps in ploty

Python 5 Updated May 14, 2024

Using plotly to perfom data visualization of ransomware leak site data

Jupyter Notebook 11 2 Updated Feb 15, 2024

C2 Active Scanner

Go 41 4 Updated Jun 19, 2024

An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications

Python 91 7 Updated Jul 22, 2024

Splunk Docker GitHub Repository

Python 451 245 Updated Jun 20, 2024

A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.

29 7 Updated Jul 23, 2024

Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations

PowerShell 70 6 Updated Mar 1, 2024

Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.

422 71 Updated Jun 15, 2024

Pen Test Report Generation and Assessment Collaboration

JavaScript 394 26 Updated Jul 27, 2024

Explore the GOAD Active Directory lab in 5 minutes with Adalanche

33 2 Updated Jan 8, 2024

This is a collection of threat detection rules / rules engines that I have come across.

266 20 Updated May 5, 2024

A repository to share publicly available Velociraptor detection content

YARA 113 19 Updated Jul 28, 2024

A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).

490 54 Updated Jul 20, 2024

Microsoft RDP Client Extensions

C++ 130 28 Updated Jun 11, 2024

A list of RMMs designed to be used in automation to build alerts

Python 101 7 Updated Jul 25, 2024

Finds shared attributes across multiple IP addresses by querying Censys

Python 2 1 Updated Oct 20, 2020

Dedup yara rules based on their rule identifier

Go 2 1 Updated Aug 28, 2023

A standard for reducing log volume without sacrificing analytical capability

180 16 Updated Jul 26, 2023

ScriptSentry finds misconfigured and dangerous logon scripts.

PowerShell 275 27 Updated Jul 23, 2024
Rich Text Format 6,351 833 Updated Jul 26, 2024
Next