Skip to content
View huangexiaoyu's full-sized avatar

Block or report huangexiaoyu

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs

Python 695 96 Updated Feb 4, 2025

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

Rust 2,435 210 Updated Feb 8, 2025

Have fun with audit log analysis :)

148 34 Updated May 5, 2024

安全场景、基于AI的安全算法和安全数据分析业界实践

1,668 339 Updated Jul 28, 2021

Original implementation and resources of DeepCASE as in the S&P '22 paper

Python 91 26 Updated Aug 1, 2023

Pure Python parser for Windows Event Log files (.evtx)

Python 734 165 Updated Jul 27, 2024

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover su…

Python 1,290 241 Updated Nov 7, 2024

Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber

PowerShell 860 165 Updated Nov 17, 2020

《Web安全之强化学习与GAN》

Python 221 123 Updated Feb 23, 2020

深度学习500问,以问答形式对常用的概率知识、线性代数、机器学习、深度学习、计算机视觉等热点问题进行阐述,以帮助自己及有需要的读者。 全书分为18个章节,50余万字。由于水平有限,书中不妥之处恳请广大读者批评指正。 未完待续............ 如有意合作,联系[email protected] 版权所有,违权必究 Tan 2018.06

JavaScript 55,309 15,928 Updated Jun 26, 2024

Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.

914 244 Updated Nov 28, 2024

Pre-Built Vulnerable Environments Based on Docker-Compose

Dockerfile 18,226 4,524 Updated Feb 7, 2025

Snort in Docker for Network Functions Virtualization (NFV)

Dockerfile 107 57 Updated Apr 29, 2019

📓 Long(er) text representation and classification using Doc2Vec embeddings

Python 106 42 Updated Jun 17, 2024

Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等

1,166 294 Updated Jul 8, 2023

Exploitkit

PHP 184 136 Updated Dec 10, 2016

One of a few malware collections on the GitHub.

Python 2,461 556 Updated Jul 31, 2024

Defund the Police.

12,245 2,590 Updated Jun 7, 2024

将Linux现常用的网络加速集成在一起

C 3,767 2,590 Updated Nov 10, 2022

A little tool to play with Windows security

C 19,752 3,788 Updated Jul 5, 2024

Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.

Python 15 3 Updated Nov 29, 2017
Makefile 14 11 Updated Nov 29, 2020

Google CTF

Python 4,595 569 Updated Dec 23, 2024

A collection of hacking / penetration testing resources to make you better!

15,606 2,131 Updated Mar 12, 2024

Course materials for Malware Analysis by RPISEC

3,806 791 Updated Aug 26, 2022

Linux audit userspace repository

C 615 215 Updated Feb 7, 2025

Material from the DARPA Transparent Computing Program

187 25 Updated Apr 29, 2020

A Linux Auditd rule set mapped to MITRE's Attack Framework

779 128 Updated Jul 8, 2020

Attack Detection

1,350 356 Updated Aug 31, 2022
Next