Note
📌 AI-Assisted Code Notice
- The SQL in this repository was developed with the help of AI tools.
- It is intended for educational/demonstration purposes only—review and test thoroughly before any other use.
Tip
- A YouTube video to explain how to use this repo is under progress
- Deadline is September, 2025
This repository contains SQL scripts and database schemas for working with security information, including:
- Security log analysis
- User access monitoring
- Compliance reporting
- Threat detection queries
- Security event logging databases
- User access control systems
- Network monitoring databases
- Detecting brute force attacks
- Identifying unusual access patterns
- Compliance reporting (GDPR, PCI, etc.)
- Privilege escalation detection
- Clone this repository
- Review the database schemas in
/database-schemas
- Execute queries against your security database (adjust as needed)
Please see CONTRIBUTING.md for guidelines.
Thiago Maria - From Brazil to the World 🌎
Senior Security Information Professional | Passionate Programmer | AI Developer
With a professional background in security analysis and a deep passion for programming, I created this Github acc to share some knowledge about security information, cybersecurity, Python and AI development practices. Most of my work here focuses on implementing security-first approaches in developer tools while maintaining usability.
Lets Connect: