Skip to content
View vVv-Keys's full-sized avatar
🔑
Intellectual; noob programming; learning - educational purposes’ 👀
🔑
Intellectual; noob programming; learning - educational purposes’ 👀

Block or report vVv-Keys

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
vVv-Keys/README.md
Typing SVG Banner

🧠 ABOUT ME

🔬 Quantum Threat Intelligence™ (QTI) — Published 2025 (CTI → behavior → detections)
🛠️ Toolsmith for cybersecurity simulation & defense (detection-first, telemetry-driven)
🔍 Focus: Threat Hunting · Detection Engineering · Red Team Ops · Memory Forensics · CTI Pipelines
📊 Method: Offensive R&D → realistic adversary emulation → measurable detections & rules
🚀 Projects: KeysGuardCyberNeticsAIShadow
⚙️ Philosophy: Always learning, always building — across code, systems, and adversary logic


🧪 What I’m Building / Exploring:

  • Detection content: Sigma/YARA rulecraft, tuning, coverage mapping (MITRE ATT&CK) |
  • Threat simulation: atomic-style tests, emulation plans, and operator workflows |
  • CTI automation: enrichment, clustering, fusion, and “intel-to-detection” pipelines |
  • Memory-focused security R&D: triage, artifacts, tradecraft-aware analysis |

🛰️ “Assume breach. Simulate smarter.”


Detect · Defend · Dominate


🚀 Recent Contributions

  • OWLWATCH – Developed a daily automation and reporting tool integrating Jinja2 templates, GitHub Actions, and Discord webhooks.
  • Sigma Rule Development – Authored numerous detection rules focusing on lateral movement, remote execution, and other adversary techniques across Windows (e.g., PsExec, Msiexec, InstallUtil, Certutil, Schtasks, Wmic, Bitsadmin, Rundll32, MsBuild, Certreq, Wevtutil, Regsvcs/Regasm, At.exe, net use).
  • Falco Runtime Rules – Added container runtime security rules to FALCOSEC for detecting suspicious remote script execution and network events.
  • Threat Hunting Insights – Published CTI-driven hunting reports linking Sigma detection rules with MITRE tactics and providing actionable hunting tips (msiexec, wevtutil, PsExec, net use, certutil, at.exe).

Feel free to explore these repositories and contributions!

Pinned Loading

  1. redcanaryco/atomic-red-team redcanaryco/atomic-red-team Public

    Small and highly portable detection tests based on MITRE's ATT&CK.

    C 11.5k 3k

  2. SigmaHQ/sigma SigmaHQ/sigma Public

    Main Sigma Rule Repository

    Python 10.1k 2.5k

  3. mitre/caldera mitre/caldera Public

    Automated Adversary Emulation Platform

    Python 6.7k 1.3k

  4. OWLWATCH OWLWATCH Public

    daily automation and reporting 8AM/10PM AMERICA/CHICAGO

    Python 1

  5. keys-falcosecurity-rules keys-falcosecurity-rules Public

    Forked from falcosecurity/rules

    Falco rule repository

    Go 2

  6. SIGMA SIGMA Public

    Forked from SigmaHQ/sigma

    Main Sigma Rule Repository

    Python 1