-
Code published here is private and not affiliated with my employer.
- Germany
- http://patzke.org
- @[email protected]
Stars
A pySigma wrapper and langchain toolkit for automatic rule creation/translation
An opensource sigma conversion tool built using pysigma
Collection of Cyber Threat Intelligence sources from the deep and dark web
Public release of Telepathy, an OSINT toolkit for investigating Telegram chats.
GPT4All: Run Local LLMs on Any Device. Open-source and available for commercial use.
A repository of breaches of AWS customers
Collection of Jupyter Notebooks by @fr0gger_
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Elastic Security detection content for Endpoint
Sigma signatures matcher written in Python
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence
Some Threat Hunting queries useful for blue teamers
PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
This repo is where I store my Threat Hunting ideas/content
The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifa…
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
Python API for interacting with sigma rules.
A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare and see what's been added with each update. Use these CSVs t…
Collection of Event ID ressources useful for Digital Forensics and Incident Response
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Rapidly Search and Hunt through Windows Forensic Artefacts






