Christian Taillon
Information Security
Phoenix Cyber Events
Splunk Cheatsheet
Splunk Beginner Guide
KQL Beginner Guide
Falcon LogScale (FQL)
Sigma Rule Guide
ClamAV Guide
YARA Rule Guide
SNORT Rule Guide
Cyber Security Resources
Gist/christian-taillon
Endpoint Forensics
Sith CheatSheet: Kali
Recon-ng Guide
DNS OSINT PDF
Threat Hunting and Intel
APTTracker.md
Detect-AutoIT
SigmaGUI
Atomic Guide
Part-time Threat Hunting: Considering its Efficacy
Prophet Spider Exploits Citrix ShareFile to Deploy Webshell
QakBot Detection: DUCK HUNT
QakBot Detection: DUCK HUNT Part 2 — The .LNK
Log4j
Sunburst
Various Search Leads
What do we actually know about the Darkside Ransomware operators?
GitHub Actions Abuse by Cryptominers
Dev and Projects
Splunk Docker
Splunk BOTSv2 Walkthrough
Git CheatSheet
RC Files
AutoIT-Seeker
Container Device Interface
ParetoPi
DockerPihole
Splunk Windows Forwarder
Programing Basics
Python3 Virtual Environments
File Arrangement and Sorting Tool
Machine Learning and AI
AI Security Code Review
Agentic SOC
Agentic Prompting
Llama Guard
Token Guard
OpenWebUI Community
Chat-CLI GitHub
OpenWebUI Stack Guide
AI Pipelines GitHub
LLM Distillery GitHub
Bean-Counter
Container Device Interface
Scanned Models List
LLM Security Guide
Local GPT Guide
vLLM Guide
Generative AI Use in InfoSec
Slides Building a Private GenAI Team
Slides Enterprise GenAI Risk Mitigation
Interview Resources
General Cyber Interview
SOC Interview
Security Engineer
Threat Hunter
LLM / GenAI Developer Interview
InfoSec Resources
About Me
Search
✕
dns-osint