From 46adec33a08f10a1c69629114e2ca7a5d05ff3e8 Mon Sep 17 00:00:00 2001 From: Matthew Iverson Date: Thu, 28 Nov 2024 00:51:35 -0500 Subject: [PATCH] Delete Assets/random_tip.py --- Assets/random_tip.py | 153 ------------------------------------------- 1 file changed, 153 deletions(-) delete mode 100644 Assets/random_tip.py diff --git a/Assets/random_tip.py b/Assets/random_tip.py deleted file mode 100644 index 6bfafc0..0000000 --- a/Assets/random_tip.py +++ /dev/null @@ -1,153 +0,0 @@ -import random -from colorama import Fore, Style - -TIPS = [ - "πŸ” Look for multiple failed login attempts followed by a success.", - "πŸ‘₯ Monitor for the creation of suspicious or unusual accounts.", - "πŸ–‹οΈ Keep an eye out for renamed files or sudden changes to file extensions.", - "πŸ›‘οΈ Always investigate signs of persistence mechanisms like scheduled tasks or services.", - "πŸ” Check logs for lateral movement patterns within the network.", - "πŸ“‚ Look for data exfiltration attempts during off-hours.", - "πŸ•΅οΈβ€β™‚οΈ Watch for processes running in uncommon directories.", - "πŸ—‚οΈ Review changes to sensitive directories like /etc or C:\\Windows\\System32.", - "⚠️ Be alert to PowerShell scripts with obfuscation or base64 encoding.", - "πŸ“₯ Investigate unusual inbound or outbound traffic patterns.", - "πŸ’» Track the execution of unknown binaries or scripts.", - "πŸ“Š Analyze event logs for sequences that indicate privilege escalation.", - "🌐 Monitor for connections to known malicious IPs or domains.", - "πŸ“ˆ Look for unusual spikes in network activity or CPU usage.", - "πŸ”‘ Check for default or weak passwords in critical accounts.", - "πŸ”— Watch for newly created symbolic links or junction points.", - "πŸ•’ Investigate task scheduler events outside of normal working hours.", - "πŸ“¦ Look for recently installed software that wasn’t approved.", - "πŸ”“ Monitor for attempts to disable antivirus or EDR tools.", - "πŸ“œ Analyze browser history or bookmarks for connections to malicious sites.", - "πŸ“‚ Look for files with double extensions like `.exe.pdf`.", - "πŸ› οΈ Check system startup items for unauthorized entries.", - "πŸ“€ Investigate signs of data compression and outbound transfer.", - "πŸ‘€ Watch for registry modifications in persistence-related keys.", - "πŸ” Scan for unsigned drivers or DLLs in system directories.", - "πŸ“‘ Monitor DNS queries to unusual or high-risk domains.", - "πŸ’½ Look for rogue virtual machines or snapshots.", - "πŸ–₯️ Inspect remote desktop protocol (RDP) logs for unauthorized connections.", - "πŸ›‘οΈ Review firewall logs for changes in access rules or port scans.", - "πŸ“§ Analyze email headers for signs of phishing or spoofing.", - "πŸ“Œ Monitor USB activity for unauthorized devices.", - "⚑ Look for processes with high privilege levels started by unprivileged users.", - "πŸ”— Watch for changes to trusted system binaries.", - "πŸ› οΈ Investigate event IDs related to new service installations.", - "πŸ“‚ Check shadow copies for deleted or modified files.", - "πŸ” Monitor account logins from unusual geographic locations.", - "πŸ“‚ Investigate tampering with backup files or schedules.", - "πŸ–₯️ Look for signs of remote code execution (RCE) attempts.", - "🌐 Review web server logs for suspicious parameter tampering.", - "🚦 Monitor network flows for unusual traffic patterns or unexpected ports.", - "πŸ“‘ Be suspicious of repeated DNS queries to non-existent domains.", - "πŸ”’ Check for unauthorized changes to file or folder permissions.", - "πŸ“€ Look for encrypted or compressed outbound traffic to unknown hosts.", - "βš™οΈ Monitor changes in system startup configurations.", - "πŸ” Search for PowerShell scripts that include encoded commands.", - "πŸ“ Investigate files with zero-byte size in critical directories.", - "πŸ•’ Check for processes running at scheduled intervals outside business hours.", - "πŸ“ˆ Review performance metrics for sudden resource spikes.", - "πŸš€ Look for signs of process injection into legitimate applications.", - "πŸ’» Monitor for unauthorized changes to group memberships.", - "πŸ”— Watch for symbolic links pointing to unexpected locations.", - "πŸ” Examine email attachments for hidden macros or scripts.", - "⚠️ Scan for privilege escalation techniques in event logs.", - "πŸ“¦ Look for unexpected or unsigned updates to software packages.", - "πŸ’Ύ Review logs for signs of removable media usage.", - "πŸ–₯️ Investigate unusual usage of command-line utilities like `netstat` or `ipconfig`.", - "πŸ“€ Track unusual outbound connections to high-risk countries.", - "πŸ” Look for registry keys with suspicious auto-start entries.", - "πŸ”§ Investigate changes to WMI subscriptions or filters.", - "πŸ“Š Analyze account lockout patterns for brute-force attempts.", - "πŸ›‘οΈ Monitor processes using suspicious parent-child relationships.", - "πŸ“₯ Investigate large file downloads from unusual IPs.", - "⚑ Check for unauthorized applications installed via package managers.", - "πŸ”— Look for SMB connections between unexpected hosts.", - "πŸ” Search for processes masquerading as system utilities.", - "πŸ–₯️ Review logs for attempts to clear or disable event logging.", - "πŸ“‚ Look for hidden files in critical directories.", - "🚦 Monitor outbound traffic for data transfers at odd hours.", - "πŸ”“ Check for unauthorized access to sensitive configuration files.", - "πŸ”§ Scan for unrecognized services or drivers in startup logs.", - "🌐 Review web application logs for unauthorized access attempts.", - "πŸ“œ Look for tampered audit logs or log file deletions.", - "πŸ’‘ Investigate systems with unusual uptime patterns.", - "πŸ•΅οΈβ€β™‚οΈ Monitor unusual changes to group policies.", - "πŸ“‚ Investigate abnormal growth in specific file directories.", - "πŸ› οΈ Look for unusual process execution chains in forensic tools.", - "πŸ“‹ Check for clipboard monitoring or keylogging behavior.", - "🚨 Monitor IDS/IPS alerts for common lateral movement patterns.", - "🌍 Correlate login activity with geolocation inconsistencies.", - "πŸ”‘ Investigate processes accessing security-critical files.", - "πŸ“€ Look for repeated failed data upload attempts to unknown servers.", - "πŸ” Check for malicious scheduled tasks created recently.", - "πŸ›‘οΈ Watch for unusual changes to user password policies.", - "πŸ“ˆ Investigate sudden changes in user account activity levels.", - "πŸ–₯️ Review temporary files for evidence of script execution.", - "πŸ“¦ Monitor endpoints for unauthorized package or library downloads.", - "πŸ“‚ Look for anomalies in recently accessed files.", - "βš™οΈ Investigate mismatches in user-agent strings in web traffic.", - "πŸ” Look for attackers leaving test artifacts like `1.txt` or `test.ps1`.", - "πŸ“œ Track file hashes for unauthorized changes to key binaries.", - "🚦 Review network traffic for abnormal TTL values." -] - -# Cybersecurity jokes -JOKES = [ - "πŸ€– Why did the hacker cross the road? To get to the other .NET.", - "❄️ Why was the computer cold? It left its Windows open.", - "πŸͺ₯ How do hackers freshen their breath? With CyberTic Tac!", - "β€οΈβ€πŸ©Ή Why don't hackers ever get into relationships? They're afraid of commitments.", - "🐾 What do you call a hacker who loves animals? A purr-sistence threat!", - "πŸ’Έ Why did the server go broke? It lost all its cache.", - "πŸ˜‚ How do you make a malware laugh? Give it a worm joke!", - "πŸ“‰ Why did the sysadmin go broke? Too many root expenses.", - "πŸ₯£ What’s a hacker’s favorite kind of cereal? Spy-ders!", - "πŸ›‘οΈ Why did the password break up with the hacker? It was too weak.", - "πŸ”’ Why are cybersecurity experts bad at telling jokes? They always encrypt the punchline.", - "🎡 What’s a hacker’s favorite music genre? Phishing!", - "πŸ‘“ Why do hackers wear glasses? Because they lost their focus.", - "πŸ“Ά Why did the WiFi break up with the laptop? It found a stronger connection.", - "😌 Why was the antivirus program so relaxed? It knew how to quarantine stress.", - "🍁 What’s a hacker’s favorite season? Phall.", - "πŸŒ‘ Why do programmers prefer dark mode? Because light attracts bugs.", - "🚩 What’s a hacker’s favorite game? Capture the flag!", - "☠️ Why don’t hackers get along with pirates? Too many patches.", - "πŸŽ‰ How do you throw a cybersecurity party? Invite everyone to the LAN!", - "πŸ”₯ Why was the firewall so happy? It finally blocked its ex.", - "πŸ”‘ Why was the keyboard locked out of the server room? Too many CAPS.", - "🍺 What’s a hacker’s least favorite drink? Root beer.", - "⚾ Why was the hacker bad at baseball? It couldn’t handle the curve (encryption).", - "β˜• How do cybersecurity experts like their coffee? Encrypted.", - "😭 Why did the antivirus cry? It couldn’t handle the worm.", - "🀫 Why don’t hackers tell secrets? They’re worried about key-loggers.", - "πŸ•οΈ Why don’t hackers go camping? Too many phishing attacks.", - "πŸ’ƒ What’s a hacker’s favorite dance? The worm.", - "🐴 Why was the Trojan horse so good at infiltration? It always had the β€˜write’ access.", - "πŸ§— What’s the cybersecurity expert’s favorite sport? Fire-wall climbing.", - "πŸ•΅οΈβ€β™‚οΈ Why was the hacker great at hide-and-seek? It always hid in the registry.", - "πŸ›œ What did the router say to the server? You’ve got the bandwidth for this!", - "🍽️ What’s a phishing scammer’s favorite dish? Spam.", - "🌞 Why don’t hackers get sunburned? They stay in the shadows.", - "πŸ§‘β€πŸ”¬ What do you call a group of math and science geeks at a party? Social engineers.", - "🌐 What’s the best way to catch a runaway robot? Use a botnet.", - "πŸ› Why did the programmer leave the camping trip early? There were too many bugs." -] - -COLORS = [Fore.RED, Fore.GREEN, Fore.BLUE, Fore.MAGENTA, Fore.CYAN, Fore.YELLOW, Fore.WHITE] - -def get_random_tip_with_color(): - """ - Returns a random cybersecurity tip or joke with a random color. - """ - item = random.choice(TIPS + JOKES) - color = random.choice(COLORS) - return f"{color}{item}{Style.RESET_ALL}" - -# Example usage -if __name__ == "__main__": - for _ in range(5): # Display 5 random tips or jokes - print(get_random_tip_or_joke_with_color()) \ No newline at end of file