Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View System-CTL's full-sized avatar
đźš©
Mission
đźš©
Mission

Block or report System-CTL

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
System-CTL/README.md
  • đź‘‹ A.O.A-Hi, Threat Detection and Incident Responder,
  • đź‘€ Interested in threat intelligence, blue teaming , red teaming , forensics.
  • 🌱 In process of learning forensics, red teaming.
  • 💞️ I’m looking to collaborate on linkedin.
  • đź“« you can contact me on https://www.linkedin.com/in/ab-hussain.

! ! !

Pinned Loading

  1. QRadar-AQL-Queries QRadar-AQL-Queries Public

    Forked from Cyb3rSn0rlax/QRadar-AQLQueries

    A collection of powerful AQL (Ariel Query Language) queries for threat hunting, incident investigation, and security monitoring in IBM QRadar.

    4 2

  2. Flare-VM-2025 Flare-VM-2025 Public

    Customized FLARE VM 2025 setup repository for building a fresh malware analysis lab from scratch. Includes installation commands, required dependencies, and reference data to ensure a smooth deploy…

  3. MemProcFS-2025 MemProcFS-2025 Public

    MemProCFS (Memory Process Collection and Forensic Suite) is a modular framework designed to streamline memory forensics and process investigation for SOC and DFIR teams.

  4. Velociraptor-2025 Velociraptor-2025 Public

    Velociraptor Troubleshooting & Analyst Guide — A centralized knowledge base for SOC and DFIR teams to document, analyze, and resolve Velociraptor operational issues. Includes step-by-step troublesh…

  5. Windows_Intrusion-Detection Windows_Intrusion-Detection Public

    This checklist is intended for rapid triage of a potentially compromised Windows system using only built-in utilities. It follows the guidance of NIST SP 800-61 Revision 2, focusing on the detectio…

    Python