Skip to content
View cyberbuff's full-sized avatar

Block or report cyberbuff

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
cyberbuff/README.md

Hi there ๐Ÿ‘‹

I'm Hare Sudhan, a Software/Security Engineer specializing in developing applications for Adversary Emulation.

๐Ÿ‘ท Check out what I'm currently working on

  • cyberbuff/atomic-red-team-mcp - MCP server for Atomic Red Team (1 day ago)
  • redcanaryco/atomic-red-team - Small and highly portable detection tests based on MITRE's ATT&CK. (2 weeks ago)
  • badsectorlabs/ludus_elastic_agent - An Ansible role that installs an Elastic Agent on a Windows, Debian, or Ubuntu system (3 months ago)
  • cyberbuff/LOAS - Living off the Orchard: Apple Script (4 months ago)
  • infosecB/LOOBins - Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes. (4 months ago)

๐Ÿ™‡ Recent Mentions

  1. ATT&CKCON 5 - Bridging the Gap: Enhancing Detection Coverage with Atomic Red Team, Sigma, and MITRE ATT&CK
  2. Atomic Red Team Webinar - Simplify security testing with Docker, Windows Sandbox, and Atomic Red Team
  3. Blockchain Goes to College
  4. Breaking into infosec and learning new skills with Atomic Red Team - [Youtube Video]https://www.youtube.com/watch?v=t0rwyuPoZ-E)
  5. T9Hacks 2020 winners announced

๐Ÿ“ซ How to reach me

Twitter Linkedin


Pinned Loading

  1. redcanaryco/atomic-red-team redcanaryco/atomic-red-team Public

    Small and highly portable detection tests based on MITRE's ATT&CK.

    C 11.8k 3.1k

  2. redcanaryco/invoke-atomicredteam redcanaryco/invoke-atomicredteam Public

    Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team pโ€ฆ

    PowerShell 1k 243

  3. TheAtomicPlaybook TheAtomicPlaybook Public

    The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resource to know about the tests, it's execution, detection and dโ€ฆ

    Jupyter Notebook 34 6

  4. LOOBins LOOBins Public

    Forked from infosecB/LOOBins

    Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for mโ€ฆ

    Python

  5. magicsword-io/LOLRMM magicsword-io/LOLRMM Public

    LotL RMM

    MDX 328 70

  6. nteract/papermill nteract/papermill Public

    ๐Ÿ“š Parameterize, execute, and analyze notebooks

    Python 6.4k 446