Stars
Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure …
Introduction to Machine Learning Systems
YARA signature and IOC database for my scanners and tools
Code included as part of the MustLearnKQL blog series
Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.
Find relevant incidents, logs, events, and alerts to all of your incidents. [Attack Flows, Attack Chains, & Root Cause Discovery - NO LLMs, NO Queries, Just Explainable Machine Learning] >> Use it …
Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.
Python tool for converting files and office documents to Markdown.
A curated list of tools for incident response
A starter pack of resources to help you get started in Detection Engineering.
Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)
Find, verify, and analyze leaked credentials
Notebooks & Example Apps for Search & AI Applications with Elasticsearch
An open-source, self-hosted note-taking service. Your thoughts, your data, your control — no tracking, no ads, no subscription fees.
A reactive notebook for Python — run reproducible experiments, query with SQL, execute as a script, deploy as an app, and version with git. Stored as pure Python. All in a modern, AI-native editor.
An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAR…
Machine Learning for Cyber Security
Machine Learning Interviews from FAANG, Snapchat, LinkedIn. I have offers from Snapchat, Coupang, Stitchfix etc. Blog: mlengineer.io.
In this repository, I will share some useful notes and references about deploying deep learning-based models in production.
A curated list of community detection research papers with implementations.