Skip to content
View jmo3's full-sized avatar

Highlights

  • Pro

Block or report jmo3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A curated knowledge base to build, run and mature a SOC (including CSIRT).

1,679 264 Updated Mar 24, 2026

Incident Response Methodologies 2022

1,108 186 Updated Apr 11, 2025

💥 A curated list of Terminal frameworks, plugins & resources for CLI lovers.

Shell 12,928 633 Updated Jul 26, 2024

Real-time Response scripts and schema

PowerShell 122 23 Updated Oct 23, 2025

Cyber Threat Intelligence Repository expressed in STIX 2.0

2,044 470 Updated Dec 19, 2025

python script to create, download and upload to s3 your Jira or Confluence cloud instance backup

Python 79 33 Updated Jan 13, 2026

Template Text Parser

Python 387 38 Updated Mar 24, 2026

Modular Algorithmic Trading Platform.

Python 5 6 Updated May 20, 2022

Windows OS Hardening with PowerShell DSC

PowerShell 289 115 Updated Nov 23, 2023

Brown University Executive Masters in CyberSecurity ( EMCS ) Cohort 3 All Assignments

2 Updated Jun 4, 2020

Repository for lab materials for the Advanced Cloud Security and Applied DevSecOps training class.

Ruby 11 4 Updated Jul 28, 2019

Pragmatic Network Security for Cloud and Hybrid Networks

10 6 Updated Nov 24, 2015

Whitepaper on the future of security (based on out Inflection blog post). Final title TBD

10 4 Updated Feb 14, 2014

Title: Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers, and Applications

7 3 Updated Feb 26, 2015

The security professionals guide to cloud file storage and collaboration

8 Updated Aug 1, 2014

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 1,616 350 Updated Dec 10, 2018

get more IP details from CIDR range

Go 27 3 Updated Apr 27, 2020

Turn PuTTY into an SSH login bruteforcing tool.

PowerShell 291 81 Updated Nov 21, 2020

A secure HashiCorp Vault for secrets, tokens, keys, passwords, and more. Automated deployment with Terraform on AWS. Configurable options for security and scalability. Usable with any applications …

HCL 348 62 Updated Mar 6, 2024

Timelines Chart

JavaScript 617 125 Updated Mar 21, 2025

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

Python 2,366 409 Updated Feb 19, 2026

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.

Python 3,302 597 Updated Feb 14, 2026

An educational demonstration of breaking the Enigma machine

Jupyter Notebook 492 91 Updated Aug 14, 2020

Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.

Python 85 10 Updated Nov 1, 2021

APT & CyberCriminal Campaign Collection

YARA 4,048 971 Updated Jul 25, 2024

A curated list of tools for incident response

8,904 1,656 Updated Jul 18, 2024

A python library for accessing and searching dictionaries via /slashed/paths ala xpath.

Python 628 87 Updated Jul 9, 2024

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…

Python 35 14 Updated Nov 10, 2016
Next