Skip to content
View AtJofo's full-sized avatar

Block or report AtJofo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,882 1,154 Updated May 15, 2026

A curated list of awesome YARA rules, tools, and people.

4,194 551 Updated Mar 16, 2026

Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.

16 2 Updated Dec 10, 2019

A visualized overview of the Initial Access Broker (IAB) cybercrime landscape

115 12 Updated Oct 22, 2021

Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory t…

YARA 936 89 Updated Jun 26, 2023

A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence

722 82 Updated Apr 25, 2026

📄 Awesome CV is LaTeX template for your outstanding job application

TeX 27,528 5,223 Updated Mar 13, 2026

An analytic technique created at the CIA, ACH helps you analyze complex situations with multiple hypotheses and countless pieces of evidence. Multiple people can collaborate on a single problem, an…

PHP 107 19 Updated Jan 8, 2012

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

Python 47,632 2,161 Updated Apr 18, 2024

Master the command line, in one page

160,995 14,807 Updated Jun 25, 2024

A collection of modern/faster/saner alternatives to common unix commands.

32,918 829 Updated Sep 10, 2024

Maintained collection of OSINT related resources. (All Free & Actionable)

2,358 282 Updated Aug 3, 2024

PiHole and AGH Blocklists

938 126 Updated Nov 17, 2025

A command-line hex viewer

Rust 10,137 261 Updated Apr 30, 2026

Scan for misconfigured S3 buckets across S3-compatible APIs!

Go 3,072 404 Updated Apr 25, 2026

moloch in vagrant box

Shell 1 Updated Nov 20, 2017

A curated list of Awesome Threat Intelligence resources

10,206 1,755 Updated Jan 19, 2026

Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)

C 979 195 Updated Dec 11, 2020

Issues to consider when planning a red team exercise.

612 113 Updated Aug 23, 2017

A curated list of awesome Security Hardening techniques for Windows.

1,794 272 Updated Jan 7, 2020

Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.

Go 3,094 258 Updated Aug 10, 2025

YARA signature and IOC database for my scanners and tools

YARA 2,955 665 Updated May 15, 2026

Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do

C 3,900 495 Updated Jun 21, 2024

DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, fi…

Python 344 63 Updated May 6, 2026

Incident Response Hierarchy of Needs

474 42 Updated Apr 19, 2023

NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security configurations and modifications. Making it very simple for…

Python 114 49 Updated Mar 12, 2024

An informational repo about hunting for adversaries in your IT environment.

1,866 387 Updated Nov 17, 2021

Firmware patches for the TYT-MD380 handheld radio.

C 843 249 Updated Feb 22, 2026

Some results of my DGA reversing efforts

Python 688 165 Updated Sep 28, 2025

DPS' Lightweight Investigation Notebook

HTML 434 93 Updated Dec 31, 2023
Next