Skip to content
View sankyhack's full-sized avatar

Block or report sankyhack

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Threat-Hunting-with-WebProxy-Logs-using-Pandas---Jupyter-Notebook Threat-Hunting-with-WebProxy-Logs-using-Pandas---Jupyter-Notebook Public

    Jupyter Notebook 7 3

  2. ExtractLOLBin ExtractLOLBin Public

    Script is written to fetch LOLBin Details from Security and Sysmon EVTX file.

    PowerShell 4 2

  3. Vectra-AI Vectra-AI Public

    Scripts are written to fetch rules and certain detections from Vectra AI

    Python 2

  4. Similar-looking-domain-detection-using-python-fuzzywuzzy Similar-looking-domain-detection-using-python-fuzzywuzzy Public

    Major cause of phishing and BEC incident is similar looking domain, if you detect it early, you can prevent incidents early, python fuzzywuzzy module let you do that

    Python 2

  5. Playing-with-Process-Data-of-10k-Malware-Sample Playing-with-Process-Data-of-10k-Malware-Sample Public

    Purpose of this analysis is to understand the common behavior seen like locations from where malware runs, commonly used LOLBins, processes that communicate with internet and some hunting

    Python 1

  6. Linux-Forensics-Tools-Capabilities Linux-Forensics-Tools-Capabilities Public

    This repository contains simple CSV file which list the artifacts gather by Linux forensic tools

    1