- North Carolina
-
18:03
(UTC -05:00) - in/tresean-tuggle-b36811138
Popular repositories Loading
-
Windows-Endpoint-Telemetry-I
Windows-Endpoint-Telemetry-I PublicWindows Telemetry Lab – Sysmon + Event ID 4688 + Splunk (Phase 1) Hands-on endpoint logging lab: Sysmon installation, Windows process telemetry, and SIEM ingestion.
-
Windows-Endpoint-Telemetry-II-SOC-Triage
Windows-Endpoint-Telemetry-II-SOC-Triage PublicExtended windows telemetry by validating host-based Sysmon and Event ID 4688 signals and preparing cloud-based SIEM ingestion for SOC-style detection and triage.
-
MITRE-mapping
MITRE-mapping PublicThis lab demonstrates the process of analyzing Windows endpoint execution telemetry and mapping observed behavior to the MITRE ATT&CK framework, with a focus on analyst reasoning rather than tooling.
-
process-network-correlation-lab
process-network-correlation-lab PublicThis activity consists of a PowerShell execution followed shortly by DNS resolution and outbound HTTP communication to the same domain.
-
hybrid-active-directory-lab
hybrid-active-directory-lab PublicThis project documents the deployment of a hybrid Active Directory environment in Microsoft Azure and the operational tasks performed within it.
-
azure-ad-signin-analyzer
azure-ad-signin-analyzer PublicPython tool for analyzing Azure AD sign-in logs to detect brute force and off-hours authentication activity
Python
If the problem persists, check the GitHub status page or contact support.