Pinned Loading
-
network-anomaly-detection
network-anomaly-detection PublicA Network Anomaly Detection system that leverages machine learning to monitor and identify unusual activities in network traffic in real-time. This project is designed to enhance network security b…
-
ELK-SOC-Tips
ELK-SOC-Tips PublicA comprehensive guide for SOC analysts on using the ELK Stack (Elasticsearch, Logstash, Kibana) for log analysis and incident response. This repository includes tips, tricks, and best practices for…
-
Windows-Sysmon-Threat-Hunting-Guide
Windows-Sysmon-Threat-Hunting-Guide PublicA resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.
-
sysmon-config
sysmon-config PublicForked from SwiftOnSecurity/sysmon-config
Sysmon configuration file template with default high-quality event tracing
-
Living-Off-the-Land-Techniques
Living-Off-the-Land-Techniques PublicAdvanced Living Off the Land (LotL) tactics, tools, and abuse techniques for red teams, defenders, and cyber researchers. Stealth over payload.
If the problem persists, check the GitHub status page or contact support.