Thanks to visit codestin.com
Credit goes to Github.com

Skip to content
View sankyhack's full-sized avatar

Block or report sankyhack

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Threat-Hunting-with-WebProxy-Logs-using-Pandas---Jupyter-Notebook Threat-Hunting-with-WebProxy-Logs-using-Pandas---Jupyter-Notebook Public

    Jupyter Notebook 7 3

  2. LinuxPersistenceCollector LinuxPersistenceCollector Public

    Linux Persistence Collector collects malware persistence entries in Linux and looks for IP addresses , domains and some keywords

    Go 5

  3. ExtractLOLBin ExtractLOLBin Public

    Script is written to fetch LOLBin Details from Security and Sysmon EVTX file.

    PowerShell 4 2

  4. Vectra-AI Vectra-AI Public

    Scripts are written to fetch rules and certain detections from Vectra AI

    Python 2

  5. Similar-looking-domain-detection-using-python-fuzzywuzzy Similar-looking-domain-detection-using-python-fuzzywuzzy Public

    Major cause of phishing and BEC incident is similar looking domain, if you detect it early, you can prevent incidents early, python fuzzywuzzy module let you do that

    Python 2

  6. Playing-with-Process-Data-of-10k-Malware-Sample Playing-with-Process-Data-of-10k-Malware-Sample Public

    Purpose of this analysis is to understand the common behavior seen like locations from where malware runs, commonly used LOLBins, processes that communicate with internet and some hunting

    Python 1