Skip to content
View joacole's full-sized avatar

Block or report joacole

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Dynamically generated Suricata rules from real-time threat feeds

Python 13 1 Updated Jan 5, 2026

First principles for 10x productivity with AI agents like Claude Code. Star for updates. Covers: morphability, abstraction, recursion, consistency, reproducibility, complexity limits, E2E autonomy,…

142 5 Updated Jan 3, 2026

A curated collection of DFIR skills and workflows for InfoSec practitioners.

Python 180 11 Updated Dec 28, 2025

Force Remove Copilot, Recall and More in Windows 11

PowerShell 6,906 221 Updated Jan 6, 2026

KeyLeak Detector – Scan websites for exposed API keys and secrets

Python 212 26 Updated Nov 5, 2025

A persistent database + CLI for your BBOT scan data 🧡

Python 37 7 Updated Dec 18, 2025

A curated list of tools, papers, and datasets for applying AI to cybersecurity tasks. This list primarily focuses on modern AI technologies like Large Language Models (LLMs), Agents, and Multi-Moda…

106 8 Updated Dec 14, 2025

Multi functional app to find duplicates, empty folders, similar images etc.

Rust 27,935 902 Updated Jan 7, 2026

Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.

Ruby 651 107 Updated Jul 28, 2025

This repository of PowerShell sample scripts show how to access Intune service resources. They demonstrate this by making HTTPS RESTful API requests to the Microsoft Graph API from PowerShell.

PowerShell 1,506 663 Updated Aug 19, 2024

1Password SCIM Bridge deployment examples

HCL 181 158 Updated Oct 31, 2025

Kanidm: A simple, secure, and fast identity management platform

Rust 4,402 281 Updated Jan 7, 2026

Automatic Intune Documentation to simplify the life of admins and consultants.

PowerShell 361 89 Updated Feb 6, 2025

Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux

Shell 505 75 Updated Oct 21, 2022

CyLR - Live Response Collection Tool

C# 705 95 Updated Jun 1, 2022

The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted drives and extracted artifacts from Windows, Linux, MacOS, and A…

Python 344 51 Updated Jun 25, 2022

An index of Windows binaries, including download links for executables such as exe, dll and sys files

Python 740 77 Updated Jan 7, 2026

latest version of scanners for IIS short filename (8.3) disclosure vulnerability

Java 1,614 268 Updated Sep 3, 2023

Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.

Python 206 65 Updated Feb 15, 2024

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.

Shell 3,795 877 Updated Dec 28, 2025