0x4D31 / awesome-threat-detectionLinks
β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈ
β4,206Updated 11 months ago
Alternatives and similar repositories for awesome-threat-detection
Users that are interested in awesome-threat-detection are comparing it to the libraries listed below
Sorting:
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more eβ¦β4,235Updated last year
- A curated list of awesome YARA rules, tools, and people.β3,840Updated 2 months ago
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β4,728Updated 11 months ago
- A curated list of tools for incident responseβ8,212Updated 11 months ago
- βοΈ A curated list of awesome forensic analysis tools and resourcesβ4,349Updated last week
- A curated list of Awesome Threat Intelligence resourcesβ8,889Updated last month
- Automate the creation of a lab environment complete with security tooling and logging best practicesβ4,778Updated 11 months ago
- My curated list of awesome links, resources and tools on infosec related topicsβ1,115Updated 3 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Poβ¦β3,264Updated 4 months ago
- A toolset to make a system look as if it was the victim of an APT attackβ2,608Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resourcesβ4,293Updated last year
- List of Awesome Asset Discovery Resourcesβ2,155Updated 4 months ago
- List of Awesome Red Teaming Resourcesβ7,293Updated last year
- Automated Adversary Emulation Platformβ6,209Updated last month
- Detect Tactics, Techniques & Combat Threatsβ2,175Updated 3 weeks ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.β1,921Updated 3 weeks ago
- Collection of the cheat sheets useful for pentestingβ4,063Updated last year
- An informational repo about hunting for adversaries in your IT environment.β1,789Updated 3 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activityβ4,637Updated 2 weeks ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data intβ¦β2,303Updated this week
- A collection of resources for Threat Huntersβ890Updated 8 months ago
- Windows Events Attack Samplesβ2,372Updated 2 years ago
- β2,289Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOCβ1,428Updated this week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term oβ¦β2,475Updated 4 months ago
- Interesting APT Report Collection And Some Special IOCsβ2,583Updated last week
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.β5,761Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β2,513Updated 11 months ago
- Re-play Security Eventsβ1,652Updated last year
- Cyber Threat Intelligence Repository expressed in STIX 2.0β1,877Updated last month