Skip to content
View threathunternotebook's full-sized avatar

Block or report threathunternotebook

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. SecurityOnion-Ansible-Playbooks SecurityOnion-Ansible-Playbooks Public

    Ansible Playbooks for Security Onion Deployment to VMware ESXi

    Shell 11 5

  2. SecurityOnion-ISO-Customization SecurityOnion-ISO-Customization Public

    Security Onion ISO Customization Process

    3 3

  3. ELK-Conf-and-Template-Files ELK-Conf-and-Template-Files Public

    Repository contains logstash .conf files, elasticsearch templates, and kibana visualizations/dashboards

    2 1

  4. Wireless-ElasticStack-Ingest Wireless-ElasticStack-Ingest Public

    This repository presents a method to ingest PCAP files that were collected via Airdump-ng and Kismet

    2

  5. python-scripts python-scripts Public

    Python scripts for collection, and analysis of cyber threats and artifacts

    Jupyter Notebook 1

  6. THOR-Training-Center THOR-Training-Center Public

    The Threat Hunting Operations and Response (THOR) Training Center will be coming soon. First Release will be an Alpha. This will be in a virtual machine format that can be used in Vmware Player, Wo…

    1 1