0x4D31 / awesome-threat-detectionLinks
β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈ
β4,235Updated 11 months ago
Alternatives and similar repositories for awesome-threat-detection
Users that are interested in awesome-threat-detection are comparing it to the libraries listed below
Sorting:
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more eβ¦β4,256Updated last year
- A curated list of awesome YARA rules, tools, and people.β3,865Updated 3 months ago
- A curated list of Awesome Threat Intelligence resourcesβ8,996Updated last month
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β4,766Updated 11 months ago
- A curated list of tools for incident responseβ8,254Updated 11 months ago
- My curated list of awesome links, resources and tools on infosec related topicsβ1,119Updated 4 months ago
- βοΈ A curated list of awesome forensic analysis tools and resourcesβ4,447Updated 3 weeks ago
- An informational repo about hunting for adversaries in your IT environment.β1,793Updated 3 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practicesβ4,797Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Poβ¦β3,280Updated 5 months ago
- Detect Tactics, Techniques & Combat Threatsβ2,180Updated last week
- List of Awesome Asset Discovery Resourcesβ2,162Updated 5 months ago
- A toolset to make a system look as if it was the victim of an APT attackβ2,621Updated 2 years ago
- Loki - Simple IOC and YARA Scannerβ3,571Updated 7 months ago
- A collection of resources for Threat Huntersβ892Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β2,513Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOCβ1,443Updated 2 weeks ago
- A collection of sources of indicators of compromise.β879Updated 2 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.β1,937Updated last month
- Wiki to collect Red Team infrastructure hardening resourcesβ4,305Updated last year
- β2,293Updated last year
- YARA signature and IOC database for my scanners and toolsβ2,669Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation oβ¦β1,007Updated last week
- A curated list of resources related to Industrial Control System (ICS) security.β1,787Updated last week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data intβ¦β2,314Updated this week
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.β1,415Updated 9 months ago
- Windows Events Attack Samplesβ2,387Updated 2 years ago
- Web app that provides basic navigation and annotation of ATT&CK matricesβ2,171Updated last week
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,β¦β1,123Updated 2 months ago
- APT & CyberCriminal Campaign Collectionβ3,918Updated 11 months ago