Name: Djota Soeiro
Type: User
Bio: Formado em Analise e Des. Sistemas e Redes de Computadores, em busca de contribuir de forma responsável e assim adquirir mais experiências e novas habilidades
Location: Fortaleza, CE, Brasil
Blog: https://www.linkedin.com/in/djavansoeiro/
Djota Soeiro's Projects
Organization-wide GitHub settings
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
A Linux Auditd rule set mapped to MITRE's Attack Framework
Collection of resources for Python community organizers
The Python programming language
Cybercrime forums for Cyber Threat Intelligence purpose
Articles
DevOps mentoring project
A robot powered training repository :robot:
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Contains some old pages from python.org
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
Linux commands list.
Loki - Simple IOC and Incident Response Scanner
Python scripts for Malware Bazaar
Open Cyber Threat Intelligence Platform
Nesse projeto reconstruida a página inicial de login do Instagram, no qual será abordado o conceito sobre CSS utilizando Flexbox, uma metodologia de posicionamento de elementos em tela mais utilizada no mercado assim como conceitos de responsividade.
Brazilian Portuguese translation of the Python Documentation
Repository with materials created in python courses
This site has a lot of security breaches to exploit. Do not install on production environments!
Reverse Engineer's Toolkit
Shell script skills enhancement repository
Generic Signature Format for SIEM Systems
The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings the result of the defensive security analysis with an offensive mindset performed in the execution many different Malwares in our lab environment.