Block or Report
Block or report 8ear
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLanguage
Sort by: Recently starred
Starred repositories
Transform Linux Audit logs for SIEM usage
🐳🧂 Dockerized Salt Master - Boost your @saltstack master service with the power of @docker
Netbox Plugin for integration between Proxmox and Netbox
🔹Automatically populate the entities-list of lovelace cards
Home Assistant integration framework for (garbage collection) schedules
German electrical symbols for Sweet Home 3D
Lovelace card for Home Assistant showing Deutscher Wetterdienst (DWD) warnings
Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.
Documentation and scripts to properly enable Windows event logs.
🏠 A feature-rich but lightweight, buildroot-based Linux operating system alternative for your CloudFree CCU3/ELV-Charly 'homematicIP CCU' IoT smarthome central. Running as a pure virtual appliance …
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT (pa…
Online hash checker for Virustotal and other services
A repo for sample MDATP Power BI Templates
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Signatures and IoCs from public Volexity blog posts.
A collection of tips for using MISP.
This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.
The Intelligent Process Lifecycle of Active Cyber Defenders
Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results
Extract and Visualize Data from URLs using Unfurl
Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.
How to systematically secure anything: a repository about security engineering
This repo is meant to be a list of companies that hire security people full remote.
a list of cybersecurity internships