Enable command-line use and customization of GitHub Copilot without relying on VS Code or other IDEs.
-
Updated
Apr 13, 2026 - Shell
Enable command-line use and customization of GitHub Copilot without relying on VS Code or other IDEs.
Detection rules for the Claude Code source leak : 16 Sigma rules, Splunk, Elastic, YARA. Lab-validated on GOAD Light DC02.
SOC Detection Engineering & Incident Investigation with Wazuh across Linux and Windows endpoints
Cybersecurity portfolio — OWASP, MITRE ATT&CK methodology, cheatsheets, and writeups
Autonomous Vigilance Engine for Reconnaissance Yield
Production-grade Kubernetes security lab with 5 attack scenarios, automated detection (Trivy/Falco/Kubescape), and hands-on exploitation
Prácticas de Seguridad Informática: criptografía, TLS 1.3, hardening, auditoría web (OWASP), IDS (Suricata), pentesting (NIST 800-115, MITRE ATT&CK)
Modern Purple Team Lab: Intentionally vulnerable Ubuntu 24.04 environment for security research, MITRE ATT&CK mapping, and SIEM detection engineering
Open-source security operations center (SOC) lab environment designed for defenders, detection engineers, and security analysts to learn and practice blue team tradecraft in a controlled, reproducible, and fork-friendly setting.
Claude Code plugin — 18 cybersecurity domains: IR, DFIR, DevSecOps, SOC, Code Security, Container, Compliance, Cloud/CSPM, Zero Trust, AI/ML, API, Vulnerability Mgmt, Threat Intel, OT/ICS, Governance. Bilingual Thai+English.
Multi-layered AWS security architecture with Wazuh SIEM, SOAR automation, CSPM, and network segmentation achieving <29-second threat response
Cybersecurity lab demonstrating MITRE ATT&CK T1110 brute force attack simulation using Kali Linux and Hydra. Includes reconnaissance, attack execution, IoC analysis, and SOC defense strategies with Fail2Ban and 2FA implementation.
A forensic analysis of a simulated cyber-physical attack on Thames Water, exploring network intrusion, OT sabotage, and disinformation tactics.
This is a proof-of-work for abusing "fsmonitor" against IDE.
Enterprise-grade solution eliminating persistent MITRE technique lookup failures affecting thousands of Wazuh installations worldwide. Fixes both UUID compatibility and obsolete rule modernization.
A library of post-exploitation MacOS scripts based on threat emulation, LOObins, CTI, and MITRE ATT&CK.
A Sandcat plugin to manage all macOS, Windows, and Linux abilities.
Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian
This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.
Easy to extend initial access scenario to help with EDR testing on Linux and Mac
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."