GitHub Trends
10.4K subscribers
15.5K links
See what the GitHub community is most excited about today.

A bot automatically fetches new repositories from https://github.com/trending and sends them to the channel.

Author and maintainer: https://github.com/katursis
Download Telegram
#javascript #good_first_contribution #good_first_issue #good_first_project #help_wanted #incident #infrastructure #infrastructure_monitoring #mui #mui_material #server_monitor #server_monitoring #server_monitoring_tools #statuspage #uptime #uptime_checker #uptime_monitor #uptime_monitoring #uptime_status #uptimerobot

Checkmate is a free, open-source tool that helps you monitor your servers and websites. It checks if your servers and websites are working properly and sends you alerts if there are any issues. You can also use it to monitor things like CPU, RAM, and disk usage with an extra tool called Capture. Checkmate is easy to install and use, and it has features like email notifications and scheduled maintenance. If you have questions or ideas, you can join their Discord channel to talk to the team. Using Checkmate helps you keep your servers and websites running smoothly without extra costs.

https://github.com/bluewave-labs/checkmate
#yara #awesome_list #blueteam #blueteam_tools #cti #detection #detection_engineering #dfir #hacktools #incident_response #ioc #iocs #ir #ransomware #redteam #rmm #security #siem #soc #threat_hunting #threat_intelligence

You can access comprehensive security detection lists and threat hunting resources that help identify malicious activity across your infrastructure. These curated collections include indicators like suspicious file hashes, domain names, IP addresses, and behavioral patterns organized by threat type—from ransomware and phishing to command-and-control servers and vulnerable drivers. By integrating these lists into your security tools like SIEM platforms and endpoint detection systems, you gain immediate visibility into known threats while learning detection methodologies through guides and YARA rules. This accelerates your ability to hunt for compromises, validate security controls, and stay current with emerging attack techniques without building detection logic from scratch.

https://github.com/mthcht/awesome-lists