Starred repositories
get price info from heizoel24 via restful integration
esphome component to connect to Hörmann Garage Door
Modern UI and powerful API for Ansible, Terraform/OpenTofu/Terragrunt, PowerShell and other DevOps tools.
Transform Linux Audit logs for SIEM usage
🐳🧂 Dockerized Salt Master - Boost your @saltstack master service with the power of @docker
Netbox Plugin for integration between Proxmox and Netbox
🔹Automatically populate the entities-list of lovelace cards
Home Assistant integration framework for (garbage collection) schedules
German electrical symbols for Sweet Home 3D
Lovelace card for Home Assistant showing Deutscher Wetterdienst (DWD) warnings
Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.
Documentation and scripts to properly enable Windows event logs.
🏠 Buildroot-based, cloud-free smart-home platform for a Homematic IP CCU (CCU3/ELV-Charly). Runs on Raspberry Pi & x86/ARM or as a virtual appliance (Proxmox VE, Home Assistant, Docker/LXC/K8s)...
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT (pa…
Online hash checker for Virustotal and other services
A repo for sample MDATP Power BI Templates
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Signatures and IoCs from public Volexity blog posts.
A collection of tips for using MISP.
This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.
The Intelligent Process Lifecycle of Active Cyber Defenders
Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results
Extract and Visualize Data from URLs using Unfurl
Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.