Maziyar Hamzavi's Projects
Active Directory Auditing Best Practices
Apache2 Modsecurity
A curated list of awesome YARA rules, tools, and people.
DNS Incident Response
The Elastic stack (ELK) powered by Docker and Compose.
making a Tunnel between two VPS that one of which is in Iran and another VPS occur on a foreign country and send the traffics to a foreign data center and use free internet. with this bash script, you can make a tunnel between two servers
PowerShell Digital Forensics & Incident Response Scripts.
Lpic101_Note for beginner
Adversaries commonly abuse the Local Security Authority Subsystem Service (LSASS) to dump credentials for privilege escalation, data theft, and lateral movement. The process is a fruitful target for adversaries because of the sheer amount of sensitive information it stores in memory.
make valid SSL with acme
All About Me.
Collection of created MindMaps
Make CA root server and Certificate for web Server with openssl Script.
Use Histogram and Parzen Window to estimate Kenrnel Density Estimation and Plot Figure for Pattern Recognition
Install and Configuration Webmail By Postfix Dovcout Opendkim Roundcube
13 Essential Things to Know about PowerShell Download Cradles
Elastic Security detection content for Endpoint
Investigate Attack Patterns using SIEM, Sysmon Utility and MITRE ATT&CK
Starting your first threat hunting
UBUNTU DNS SERVER WITH BIND9
Ubuntu NTP Server Configurations
Windows Event Log Analysis & Incident Response Guide
When conducting an investigation on a Windows machine there are 8 phase to go through, today we’ll discuss the first ‘Collecting Volatile Information’, and the rest will be explained in future topics
Useful Wire shark command for threat hunting
A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.
Easily scan with multiple yara rules from different sources.