Skip to content
Avatar

Highlights

  • Arctic Code Vault Contributor
brokensound77/README.md

Pinned

  1. Rules for Elastic Security's detection engine

    Python 605 118

  2. Client side API for Alert Logic Threat Manager incidents and events

    Python 3 3

  3. OptionsBleed (CVE-2017-9798) PoC / Scanner

    Python 11 2

  4. Local File Inclusion

    Python 1

  5. IDENT protocol enumeration

    Python 3 3

  6. Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data

    Python 8 4

1,124 contributions in the last year

Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Mon Wed Fri

Contribution activity

January 2021

Created 1 repository

Created a pull request in elastic/kibana that received 2 comments

[Detection Rules] Add 7.11 rules

Summary Pull updates to detection rules from https://github.com/elastic/detection-rules/tree/7.11 This is the 2nd update after #85506 (likely at le…

+2,382 −1,023 2 comments
Opened 4 other pull requests in 2 repositories

Created an issue in elastic/detection-rules that received 2 comments

[Rule Tuning] Threats which define only a tactic must contain an empty array

Related to elastic/kibana#87546 In Kibana 7.11, ATT&CK techniques were made optional, but the field is still required to be set as an empty array. …

2 comments
Opened 1 other issue in 1 repository
elastic/detection-rules
1 open
1 contribution in private repositories Jan 11

Seeing something unexpected? Take a look at the GitHub profile guide.