Skip to content

Instantly share code, notes, and snippets.

@tuantm8
tuantm8 / gist:99b1faca3602d771d41fa7d411d569e5
Created September 19, 2024 03:50 — forked from inodee/gist:3bb01bdf4f8e7f7e4b30347403b67427
Builds a Concurrency Table of Minute x Hour to be later displayed as a Heatmap using table's overlay
index=_internal sourcetype=scheduler search_type="scheduled" scheduled_time=* savedsearch_name=*rule scheduler rule earliest=-24h@h latest=@h
| eventstats count by savedsearch_name
| where count>=23
| eval H=strftime(scheduled_time, "%-H")
| eval M=strftime(scheduled_time, "%-M")
| chart limit=24 count over M by H
| table M 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Rating System:

| 😑 - Awful | 😠 - Bad | 😐 - Fine | πŸ˜ƒ - Good | 😁 - Exceptional |

---------------------------------------------------------------------------------------------------------------

books listed in chronological order from last read to first read

  • πŸ˜ƒ - Surveillance Valley - Yasha Levine
  • πŸ˜ƒ - The Ransomware Hunting Team - Renee Dudley and Daniel Golden
  • 😠 - CRACK99 - David Locke Hall
  • πŸ˜ƒ - The Spy Who Couldn't Spell - Yudhijit Bhattacharjee
  • 😐 - The Fifth Domain - Richard A. Clarke, Robert K. Knake
  • 😁 - Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks - Scott J. Shapiro
@tuantm8
tuantm8 / windows event logs cheat sheet
Created April 20, 2024 09:42 — forked from githubfoam/windows event logs cheat sheet
windows event logs cheat sheet
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
# PS : ChatGPT makes mistakes, consider "trust but verify" principle
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
#Events to Monitor
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
#run
eventvwr.msc Event viewer
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Event Viewer(Local)-Windows Logs (shutdown / restart )
@tuantm8
tuantm8 / EventLogSearcher.cs
Created March 6, 2024 09:50 — forked from benpturner/EventLogSearcher.cs
Threaded EventLogSearcher for 4624 events
using System;
using System.Collections.Generic;
using System.Diagnostics.Eventing.Reader;
using System.Text.RegularExpressions;
using System.Threading;
namespace EventLogSearcher
{
class Program
{
@tuantm8
tuantm8 / rules-both.iptables
Created September 25, 2017 10:35 — forked from jirutka/rules-both.iptables
Basic iptables template for ordinary servers (both IPv4 and IPv6)
###############################################################################
# The MIT License
#
# Copyright 2012-2014 Jakub Jirutka <jakub@jirutka.cz>.
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
@tuantm8
tuantm8 / Security Onion installation
Created August 9, 2017 10:08 — forked from cleesmith/Security Onion installation
Security Onion installation in a virtualbox
Security Onion
Aug 2014:
... my purpose for installing this was to:
- learn more about security stuff
- steal the packet captures (pcap) provided so I can replay them using tcpreplay for snort testing,
as it's not so sexy to just test using ICMP ping data or local rules that match anything
see:
http://blog.securityonion.net/

Recommended Reading List for Developers 1st Half 2014

The Recommended Reading List is a valuable resource for technical professionals who want to thoroughly explore topics such as multi-core programming, embedded, security, and more. Dozens of industry technologists, corporate fellows, and engineers have helped by suggesting books and reviewing the list.

Books For Hardware Developers

Power and Thermal Management

  • Power Management in Mobile Devices - Findlay Shearer - Newnes - 9780750679589
  • Thermal and Power Management of Integrated Circuits - Arman Vassighi, Manoj Sachdev - Springer - 9781441938329