Skip to content

Instantly share code, notes, and snippets.

View holisticinfosec's full-sized avatar

Russ McRee holisticinfosec

View GitHub Profile
@holisticinfosec
holisticinfosec / keybase.md
Created February 22, 2018 06:48
Keybase.io

Keybase proof

I hereby claim:

  • I am holisticinfosec on github.
  • I am holisticinfosec (https://keybase.io/holisticinfosec) on keybase.
  • I have a public key ASAc1t0PISb-ZngqpjZbc97zLn6ThDLJZjGdRHLt6l3QCgo

To claim this, I am signing this object:

@holisticinfosec
holisticinfosec / Security_Access_Logs_Function.R
Last active June 3, 2018 21:57
Security Access Logs Function
# Created from Anomalize project, Matt Dancho
# https://github.com/business-science/anomalize
library(dplyr)
library(tibbletime)
setwd("C:/coding/R/anomalize/")
logs <- read_csv("log.csv")
security_access_logs <- logs %>%
group_by(server) %>%
as_tbl_time(date)
security_access_logs
@holisticinfosec
holisticinfosec / Server_Logon_Counts.R
Last active June 3, 2018 21:56
Server Logon Counts - Anomalize
# Created from Anomalize project, Matt Dancho
# https://github.com/business-science/anomalize
library(tidyverse)
library(anomalize)
security_access_logs %>%
ggplot(aes(date, count)) +
geom_point(color = "#2c3e50", alpha = 0.25) +
facet_wrap(~ server, scale = "free_y", ncol = 3) +
theme_minimal() +
theme(axis.text.x = element_text(angle = 30, hjust = 1)) +
@holisticinfosec
holisticinfosec / Security_Event_Log_Anomalies.R
Last active June 3, 2018 21:54
Security Event Log Anomalies
# Created from Anomalize project, Matt Dancho
# https://github.com/business-science/anomalize
security_access_logs %>%
# Data Manipulation / Anomaly Detection
time_decompose(count, method = "stl") %>%
anomalize(remainder, method = "iqr") %>%
time_recompose() %>%
# Anomaly Visualization
plot_anomalies(time_recomposed = TRUE, ncol = 3, alpha_dots = 0.25) +
labs(title = "Security Event Log Anomalies", subtitle = "STL + IQR Methods")
@holisticinfosec
holisticinfosec / SERVER-549521_Anomalies_Twitter+GESD.R
Last active June 16, 2018 18:25
SERVER-549521 Anomalies Twitter + GESD Methods
# Created from Anomalize project, Matt Dancho
# https://github.com/business-science/anomalize
# Get only SERVER549521 access
SERVER549521 <- security_access_logs %>%
filter(server == "SERVER-549521") %>%
ungroup()
# Anomalize!!
SERVER549521 %>%
# Twitter + GESD
time_decompose(count, method = "twitter", trend = "4 months") %>%
@holisticinfosec
holisticinfosec / SERVER-549521_Anomalies_STL+IQR.R
Last active June 3, 2018 22:46
SERVER-549521 Anomalies STL + IQR Methods
# Created from Anomalize project, Matt Dancho
# https://github.com/business-science/anomalize
SERVER549521 %>%
# STL + IQR Anomaly Detection
time_decompose(count, method = "stl", trend = "4 months") %>%
anomalize(remainder, method = "iqr") %>%
time_recompose() %>%
# Anomaly Visualization
plot_anomalies(time_recomposed = TRUE) +
labs(title = "SERVER-549521 Anomalies", subtitle = "STL + IQR Methods")
@holisticinfosec
holisticinfosec / Decomposition_Anomalized_Downloads.R
Last active June 3, 2018 22:48
Decomposition of Anomalized SERVER-549521 Downloads
# Created from Anomalize project, Matt Dancho
# https://github.com/business-science/anomalize
security_access_logs %>%
filter(server == "SERVER549521") %>%
ungroup() %>%
time_decompose(count) %>%
anomalize(remainder) %>%
plot_anomaly_decomposition() +
labs(title = "Decomposition of Anomalized SERVER-549521 Downloads")
@holisticinfosec
holisticinfosec / WaitList.dat.ps1
Created September 19, 2018 23:04
Barnaby Skeggs's WaitList.dat PowerShell enumerator
Stop-Process -name "SearchIndexer" -force;Start-Sleep -m 500;Select-String -Path $env:USERPROFILE\AppData\Local\Microsoft\InputPersonalization\TextHarvester\WaitList.dat -Encoding unicode -Pattern "password"
@holisticinfosec
holisticinfosec / sim_toolsmith_demo.xml
Created February 22, 2021 00:07
Sim toolsmith demo
<?xml version="1.0" encoding="utf-8"?>
<sim>
<delete>false</delete>
<errordirectory>C:\Users\Public\Documents\</errordirectory>
<task>
<config>
<name>PowerShell_test</name>
<loop>3</loop>
<pause>1000</pause>
</config>
[
{
"title": "NOBELLIUM FoggyWeb File Drop Sysmon",
"description": "After compromising an AD FS server, NOBELIUM was observed dropping version.dll on the system.",
"author": "Russ McRee (holisticinfosec), Florian Roth, (@cyb3rops)",
"tags": [
"attack.persistence",
"attack.defense_evasion"
],
"level": "critical",