Skip to content
View dbertho's full-sized avatar

Block or report dbertho

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or even inspiration).

265 23 Updated Oct 28, 2025

Worldwide map of OSINT tools. 614 services (cadastral maps, business registries, public transport maps, passengers lists, venicle information).

CSS 203 34 Updated Feb 6, 2024
Python 14 4 Updated Feb 24, 2025

A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more.

414 50 Updated Aug 10, 2025

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Python 1,577 302 Updated Nov 4, 2025

Collection of Cyber Threat Intelligence sources from the deep and dark web

3 Updated Dec 26, 2024

Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc

572 61 Updated Aug 15, 2025

Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.

HTML 800 141 Updated May 22, 2023

A GUI and CLI tool for removing bloat from executables

Python 432 37 Updated Jul 5, 2025

Welcome to the SEKOIA.IO Community repository!

HTML 165 44 Updated Jul 17, 2025

D2 is a modern diagram scripting language that turns text to diagrams.

Go 22,449 591 Updated Oct 14, 2025

Kusto Query Language

416 99 Updated Jun 22, 2024

Incident Response Methodologies 2022

1,080 180 Updated Apr 11, 2025

A userscript that forces twitter to always load images and videos in full resolution

JavaScript 100 2 Updated Nov 5, 2022
PowerShell 9 Updated Oct 17, 2025

TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.

602 67 Updated Nov 5, 2025

A repository with informtion related to Cloud Osint

108 13 Updated Apr 2, 2025

A collection of several hundred online tools for OSINT

HTML 7,123 817 Updated Jul 16, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 71,419 16,178 Updated Nov 2, 2025

A crowdsourced list of undesirable Twitter accounts

Python 28 1 Updated May 8, 2022

☁️ Azure summary in bullet points

Python 1,531 623 Updated Jun 26, 2024

Sample queries for Advanced hunting in Microsoft 365 Defender

Jupyter Notebook 2,032 568 Updated Feb 17, 2022

Collection of KQL queries

1,582 369 Updated Dec 22, 2024

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

Python 5,141 798 Updated Nov 1, 2024

Online hash checker for Virustotal and other services

Python 838 149 Updated Mar 21, 2025

Phishing catcher using Certstream

Python 1,770 364 Updated Aug 13, 2024

Hunting Newly Registered Domains

Python 223 47 Updated Dec 8, 2022

Frida scripts to rewrite mobile applications at runtime to directly MitM all HTTPS traffic

JavaScript 1,815 249 Updated Sep 25, 2025

Great List of Resources to Build an Enterprise Grade Home Lab

885 96 Updated Dec 1, 2023

Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell

Java 1,707 111 Updated Dec 22, 2021
Next