Skip to content
View josehelps's full-sized avatar

Block or report josehelps

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Data from defender2db

3 2 Updated Jun 27, 2025

Scan vulnerable drivers on Windows with loldrivers.io

Go 186 18 Updated Sep 11, 2023

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Jinja 2,406 400 Updated Dec 22, 2025

Splunk Security Content

Python 1,541 433 Updated Dec 23, 2025

SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.

C# 364 58 Updated Sep 26, 2025

A binary and file access authorization system for macOS.

Objective-C++ 482 37 Updated Dec 23, 2025

LotL RMM

MDX 268 59 Updated Dec 2, 2025

Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

TypeScript 140,613 18,636 Updated Dec 24, 2025

Writing custom backdoor payloads with C# - Defcon 27 Workshop

C# 1,187 280 Updated Mar 18, 2022

harness the power of Splunk for your investigations

Shell 4 2 Updated Dec 1, 2024

A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts

JavaScript 180 11 Updated May 27, 2025

A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs

Python 766 106 Updated Apr 6, 2025

Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.

Go 17 3 Updated Oct 28, 2023

Azure JWT Token Manipulation Toolset

PowerShell 701 109 Updated Dec 6, 2024

Main Sigma Rule Repository

Python 9,944 2,506 Updated Dec 21, 2025

Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names

Python 1,640 293 Updated Jun 6, 2024

Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-time alerting, helping small to medium-sized organizations se…

Shell 1,330 131 Updated Dec 18, 2025

CLI platform to experiment with codegen. Precursor to: https://lovable.dev

Python 55,133 7,344 Updated May 14, 2025

An opensource sigma conversion tool built using pysigma

JavaScript 153 34 Updated Dec 22, 2025

Interact with your documents using the power of GPT, 100% privately, no data leaks

Python 56,926 7,594 Updated Nov 13, 2024

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident resp…

Python 1,203 160 Updated Nov 12, 2025

Tenzir is the data pipeline engine for security teams.

C++ 710 101 Updated Dec 23, 2025

The Threat Actor Profile Guide for CTI Analysts

115 15 Updated Jul 15, 2023

Terminate AV/EDR Processes using kernel driver

C# 351 67 Updated Jun 12, 2023

Kubernetes WithOut Kubelet - Simulates thousands of Nodes and Clusters.

Go 3,019 235 Updated Dec 17, 2025

evilginx3 + gophish

Go 1,925 377 Updated Jun 15, 2024

A repository of my own Sigma detection rules.

162 23 Updated Nov 25, 2025

Event Tracing For Windows (ETW) Resources

Python 412 78 Updated Oct 30, 2025

This project aims to compare and evaluate the telemetry of various EDR products.

Python 1,911 191 Updated Nov 29, 2025

Awesome VirusTotal Intelligence Search Queries

332 51 Updated May 16, 2023
Next