Skip to content
View nirhalfon's full-sized avatar

Block or report nirhalfon

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nirhalfon/README.md


> ./whoami --verbose

β”Œβ”€[ionsec@dfir-lab]─[~]
└──╼ $ cat /etc/identity

╔══════════════════════════════════════════════════════════════════════╗
β•‘                                                                      β•‘
β•‘   NAME      Β·  Nir Halfon                                            β•‘
β•‘   ROLE      Β·  Founder & CEO  β€”  IONSEC Cyber Security               β•‘
β•‘   FOCUS     Β·  Digital Forensics & Incident Response (DFIR)          β•‘
β•‘   BASED     Β·  Israel  Β·  Operating globally                         β•‘
β•‘   CAREER    Β·  20+ years in cybersecurity                            β•‘
β•‘                                                                      β•‘
β•‘   PRIOR     Β·  Head of DFIR  β€”  Israel National Cyber Directorate    β•‘
β•‘             Β·  Senior Security Analyst  β€”  Dell EMC                  β•‘
β•‘                                                                      β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

[+] Currently  β†’  Leading IR engagements against advanced threat actors
[+] Currently  β†’  Building DFIR tooling at github.com/ionsec
[+] Researching β†’  Cloud forensics Β· wiper malware Β· supply-chain attacks
[+] Mission    β†’  "Conquer the cyber world together."


> cat ./about_ionsec.md

IONSEC is a boutique cybersecurity firm built for organizations facing advanced threat actors β€” the kind that don't show up in commodity threat feeds.

We've logged 100,000+ hours of DFIR across IT, OT, and IoT environments, and we deliver everything from rapid incident response and forensic investigations to threat hunting, security assessments, and proactive research.

🚨 Incident Response πŸ”¬ Digital Forensics 🎯 Threat Hunting πŸ› οΈ Custom DFIR Tooling
Rapid containment & eradication for active intrusions Deep host, memory & cloud forensics on real cases Adversary emulation & proactive detection engineering Open-source tools shipped to the DFIR community


> ls -la ./arsenal/

πŸ” DFIR & Forensics

Volatility Velociraptor KAPE Plaso Autopsy YARA Sigma

☁️ Cloud & Identity Forensics

Microsoft 365 Entra ID AWS Azure GCP DigitalOcean Cloudflare

βš”οΈ Threat Intel & Adversary TTPs

MITRE ATT&CK CTI Malware Analysis

πŸ’» Languages & Scripting

Python PowerShell Bash Go

πŸ–₯️ Platforms & Internals

Linux Windows Docker



> grep -r "published_research" ./ionsec/

πŸ›‘οΈ Project What It Does
🚨 Operation HANDALA Public technical report + YARA detection rules for a sophisticated wiper-malware phishing campaign
πŸ“‘ DO Audit Log Scraper Chrome extension extracting DigitalOcean audit logs with forensically precise timestamps
πŸ”₯ FlareInspect Cloudflare security assessment CLI + web dashboard
🧰 Forti-DFIR DFIR toolkit for FortiGate / Fortinet investigations
πŸ“Š MAES Platform Microsoft 365 / Entra ID forensics & investigation platform
πŸ•΅οΈ EntraScout External + internal Microsoft 365 / Entra ID red-team recon with attack-chain mapping


> ./stats.sh --pretty






> ./contact.sh

For incident response engagements, threat-hunt collaborations, research partnerships, or just to talk DFIR.




"You can't defend what you don't understand."

footer

Popular repositories Loading

  1. EntraScout EntraScout Public

    Forked from osherassor/EntraScout

    External + internal Microsoft 365 / Entra ID / Azure red-team reconnaissance with attack-chain mapping

    Python 1

  2. test test Public

    CSS

  3. VolUtility VolUtility Public

    Forked from kevthehermit/VolUtility

    Web App for Volatility framework

    Python

  4. NorkNork NorkNork Public

    Forked from n00py/NorkNork

    Powershell Empire Persistence finder

    Python

  5. procfilter procfilter Public

    Forked from godaddy/procfilter

    A YARA-integrated process denial framework for Windows

    C++

  6. CimSweep CimSweep Public

    Forked from mattifestation/CimSweep

    CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

    PowerShell