Skip to content
View ibo-sec's full-sized avatar
👁️‍🗨️
Hunting malware !
👁️‍🗨️
Hunting malware !

Block or report ibo-sec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Powershell scripts for Winget with SCCM/Intune

PowerShell 298 48 Updated Jan 24, 2025

A curated list of Awesome Threat Intelligence resources

10,077 1,730 Updated Jan 19, 2026

Tools and Techniques for Blue Team / Incident Response

4,002 608 Updated Mar 27, 2025

Main Sigma Rule Repository

Python 10,320 2,587 Updated Apr 15, 2026

Collection of Event ID ressources useful for Digital Forensics and Incident Response

645 90 Updated Jun 19, 2024

MDE relies on some of the Audit settings to be enabled

PowerShell 100 10 Updated Jul 15, 2022

ICS security resources

Lua 132 30 Updated May 7, 2025

My notes taken during eJPT labs - in preparation for the exam

120 24 Updated Feb 28, 2024

All about bug bounty (bypasses, payloads, and etc)

6,702 1,260 Updated Sep 8, 2023

game of active directory

PowerShell 7,697 1,056 Updated Mar 12, 2026

Simple tool that allows you to have multiple Just-In-Time debuggers at once.

C# 96 9 Updated Dec 20, 2025

Easy automated vulnerability scanning, reporting and analysis

JavaScript 710 152 Updated Jan 10, 2020

Sysmon configuration file template with default high-quality event tracing

5,475 1,840 Updated Jul 3, 2024

A repository of sysmon configuration modules

PowerShell 3,018 645 Updated Aug 21, 2024

Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.

664 100 Updated Jun 14, 2023

Asset inventory of over 800 public bug bounty programs.

Shell 1,537 271 Updated Feb 14, 2025

Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.

C 867 110 Updated Jan 20, 2022
3 Updated May 6, 2022

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

C++ 6,911 1,255 Updated Apr 1, 2026

🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026

TypeScript 21,157 1,431 Updated Feb 28, 2026

A collection of materials related to my certification videos

1,695 353 Updated Dec 1, 2025

BSidesRoc 2022 Linux Malware/Forensics Course

Shell 75 12 Updated Mar 19, 2022

Malware samples, analysis exercises and other interesting resources.

HTML 1,625 237 Updated Jan 13, 2024

ALL IN ONE Hacking Tool For Hackers

Python 58,163 6,485 Updated Mar 15, 2026

A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon

537 111 Updated Apr 8, 2026

Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.

Go 1,062 99 Updated Jun 27, 2025
Next