Skip to content
View tomstryhn's full-sized avatar

Organizations

@sndnss

Block or report tomstryhn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
tomstryhn/README.md

Tom Stryhn

Security engineer. Incident responder. Father of three small humans who have absolutely no respect for my sleep schedule... Not that I have that myself either?


I have spent days rebuilding Active Directory after ransomware hits around the world, navigating NIS2 compliance for organisations that thought they had more time, and explaining to boards why "we have a firewall" is not a security strategy.

When I'm not doing that, I'm at home with my wife and our three kids, which has taught me more about crisis management, negotiation under pressure, and maintaining composure in chaotic environments than any IR engagement ever could.


What I work on here

  • Dummy.Lab, Hyper-V lab automation for Windows Server and Active Directory environments. PowerShell module with 52 composable cmdlets, pipeline-first design, golden image pattern, and a central audit trail that survives lab teardown. Built because repeatable, instrumented test environments should not be a manual process.
  • Scripts and utilities from real consulting work, published when they are useful beyond the engagement they came from.

Repositories

Repository Description
Dummy.Lab Hyper-V lab automation platform for Windows Server and Active Directory environments
ADObjectOwner PowerShell module for auditing and correcting AD object ownership, available on the PowerShell Gallery
Active-Directory-Unknown-SID Guide on orphaned and unresolvable SIDs in Active Directory, with risk context and remediation tooling
EventViewerCustomViews Windows Event Viewer Custom View filters for security auditing and forensics
EventFromCustomView PowerShell module for querying the Windows Event Log using Event Viewer Custom View XML files
PowerShell Scripts covering Active Directory, Microsoft Defender, logging, and general automation
PowerShell-InMemory-Execution Explanation and samples of PowerShell InMemory Execution, written from a defender's perspective

PowerShell Gallery


Background

20+ years in IT and cybersecurity. The last several focused on:

  • Active Directory recovery and hardening from scratch
  • Board and senior leadership advisory, kinda like helping the elder...
  • Ransomware incident response, the "everything is on fire" kind
  • NIS2 and CIS18 compliance work for critical infrastructure

GICSP certified. Based just outside Copenhagen, Denmark. Operating across Europe, Africa, and the US.


Find me

  • LinkedIn, professional content and occasional strong opinions
  • sndnss.dk, my own company (sndnss aps), where development and side projects happen
  • Globeteam, the consulting house, where client engagements run

Three kids. One wife. Zero tolerance for unpatched domain controllers.

Pinned Loading

  1. Dummy.Lab Dummy.Lab Public

    Hyper-V lab automation for Windows Server Active Directory environments.

    PowerShell 2

  2. PowerShell PowerShell Public

    Scripts and Functions

    PowerShell 9

  3. ADObjectOwner ADObjectOwner Public

    Powershell Module to help manage ADObject ownership in Active Directory

    PowerShell 9

  4. PowerShell-InMemory-Execution PowerShell-InMemory-Execution Public

    PowerShell InMemory Execution explained, with samples.

    PowerShell 13

  5. Active-Directory-Unknown-SID Active-Directory-Unknown-SID Public

    A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.

    21 1