Skip to content
View cyberust's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report cyberust

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Useful

169 repositories

APTnotes data

1,754 289 Updated Dec 16, 2024

APT & CyberCriminal Campaign Collection

YARA 4,000 969 Updated Jul 25, 2024

Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.

C 561 101 Updated Aug 12, 2025

An informational repo about hunting for adversaries in your IT environment.

1,825 388 Updated Nov 17, 2021

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,736 1,086 Updated Jul 29, 2025

This dataset reflects incidents of crime in the City of Los Angeles dating back to 2020. This data is transcribed from original crime reports that are typed on paper and therefore there may be some…

Jupyter Notebook 1 Updated Sep 28, 2023
Python 123 35 Updated Mar 20, 2024

A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.

34 8 Updated Jul 23, 2024

Playbooks to utilize DomainTools data in your security orchestration system

Python 7 5 Updated Sep 5, 2025

Scripts and a (future) library to improve users' interactions with the ATT&CK content

Python 585 150 Updated Dec 11, 2023

Security-related Slide Presentation & Security Research Report(大安全各领域各公司各会议分享的PPT以及各类安全研究报告)

HTML 3,584 900 Updated Sep 26, 2022

An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.

CSS 5,846 1,217 Updated Oct 20, 2025

information about ransomware groups (Ransomware Analysis Notes)

39 3 Updated Dec 26, 2023

[NeurIPS 2020] Code for "An Efficient Adversarial Attack for Tree Ensembles"

C++ 23 7 Updated Jun 6, 2021

An open source threat modeling tool from OWASP

JavaScript 1,228 317 Updated Nov 3, 2025

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…

1,077 106 Updated Jun 30, 2025

Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise

67 9 Updated Apr 29, 2024

A framework for developing alerting and detection strategies for incident response.

803 131 Updated Sep 8, 2025

Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack

Shell 12 3 Updated Apr 18, 2020

New Framework Red Team Operations

19 9 Updated Jun 7, 2021

yara detection rules for hunting with the threathunting-keywords project

YARA 151 24 Updated May 11, 2025

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…

PowerShell 2,033 211 Updated Dec 11, 2024

A collection of tools, scripts and personal research

Python 146 17 Updated Aug 6, 2025

OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines

1,046 230 Updated Oct 27, 2024

evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)

Pascal 1,494 239 Updated Dec 21, 2023

Interesting APT Report Collection And Some Special IOCs

Python 2,694 535 Updated Nov 4, 2025

Resources, tools and utilities about Threat Intelligence

74 6 Updated Mar 18, 2023

Web app that provides basic navigation and annotation of ATT&CK matrices

TypeScript 2,247 660 Updated Oct 28, 2025