Skip to content
View tavilefty's full-sized avatar
🦁
I AM GATSU!
🦁
I AM GATSU!

Block or report tavilefty

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log refere…

HTML 163 18 Updated May 15, 2026

Sigma rule specification

190 51 Updated Apr 29, 2026

Main Sigma Rule Repository

Python 10,454 2,613 Updated May 15, 2026

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

Python 5,853 3,639 Updated May 17, 2026

Splunk Security Content

Python 1,623 456 Updated May 15, 2026
Python 2,574 655 Updated May 17, 2026

Sample queries for Advanced hunting in Microsoft 365 Defender

Jupyter Notebook 2,065 575 Updated Feb 17, 2022

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

10,322 2,347 Updated May 7, 2026

A PoC backdoor that uses Gmail as a C&C server

Python 1,352 417 Updated Nov 16, 2018

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.

971 102 Updated Feb 26, 2021

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

Go 562 60 Updated May 6, 2026

Free Security and Hacking eBooks

4,869 1,080 Updated Jul 10, 2019

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML 5,640 1,006 Updated Apr 16, 2026

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

C++ 15,622 2,300 Updated May 17, 2026

TrustedSec Sysinternals Sysmon Community Guide

Python 1,413 182 Updated Feb 10, 2026

Resources To Learn And Understand SIGMA Rules

185 15 Updated Feb 14, 2023

A curated list of resources about detecting threats and defending Kubernetes systems.

407 43 Updated Sep 2, 2023

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…

1,195 117 Updated May 16, 2026

match command-line arguments to their help text

Python 14,049 840 Updated May 11, 2026

Publications from Trail of Bits

Python 1,831 228 Updated May 13, 2026

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 77,757 16,969 Updated Apr 22, 2026

Red Teaming & Pentesting checklists for various engagements

2,651 517 Updated Jul 27, 2025

This is my repo for all my THM related writeups

3 Updated Jun 17, 2022

The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.

Python 32,033 4,452 Updated May 15, 2026

Play with fluids in your browser (works even on mobile)

JavaScript 16,340 1,882 Updated Nov 12, 2024

Small and highly portable detection tests based on MITRE's ATT&CK.

C 11,960 3,123 Updated May 12, 2026

Developing experimental scripts to be used to search for crypto wallets and send the information to a C2 server that would be set up. Still a work in progress and will be unleashed to the people of…

C++ 31 7 Updated Oct 30, 2024

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

C# 19,850 3,364 Updated May 15, 2026

Volatility 3.0 development

Python 4,121 653 Updated May 1, 2026
Next