Defensive security engineering, detection content, and operational data systems.
| Principle |
|---|
| Build practical tools for authorized security review. |
| Turn evidence, logs, and telemetry into measurable defensive action. |
| Keep security work reproducible, auditable, and grounded in artifacts. |
| 🤖 |
Lithium bot status: Active build Current read: SQLite-backed normalized evidence records Next proof: Fresh record timestamps |
| Adversary Behavior | Telemetry | Defensive Control | Zeid Data Build |
|---|---|---|---|
| Account takeover | Authentication logs Mailbox rules OAuth grants Device history |
MFA review Session revocation Rule cleanup Login anomaly detection |
Identity incident checklist and account review scripts |
| Secret harvesting | Git history Workflow files Environment files Token inventory |
Secret scanning Token rotation Least-privilege review Protected branches |
Repository exposure audit workflow |
| Endpoint persistence | Services Scheduled tasks Startup folders Run keys PowerShell logs |
Persistence inventory Safe-disable process Script block logging Change audit |
Windows cleanup and persistence review toolkit |
| Data exposure | Public assets Storage permissions Application logs Repository metadata |
Exposure inventory Access review Evidence capture Remediation tracking |
Public-surface and data exposure review workflows |
| Repository | Description | Language | Stars | Updated |
|---|---|---|---|---|
| .github | Zeid Data organization profile and dynamic threat intel radar | Python | 0 | 2026-05-17T04:46:21Z |
| dominos_source | Python bindings for the Domino APIs | Python | 0 | 2026-05-13T13:46:20Z |
| Rule |
|---|
| Authorized testing only. |
| Evidence before conclusions. |
| Telemetry over vibes. |
| Rollback paths before risky changes. |
| Readable outputs beat clever outputs. |
Last generated: 2026-05-17 04:46:25 UTC
