0xrajneesh / Splunk-SIEM-Home-Lab
A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , this lab will help you with SOC tools, rules, queries, apps and integration.
☆50Updated 11 months ago
Alternatives and similar repositories for Splunk-SIEM-Home-Lab:
Users that are interested in Splunk-SIEM-Home-Lab are comparing it to the libraries listed below
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆119Updated 9 months ago
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆117Updated 9 months ago
- ☆171Updated last year
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆87Updated last month
- SIEM Cheat Sheet☆73Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- ☆46Updated 3 weeks ago
- Some important DFIR Resources☆83Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆183Updated 3 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆25Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆100Updated 7 months ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆231Updated this week
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆155Updated this week
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- ☆41Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated last month
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- Windows Malware Investigation Scripts & Docs☆75Updated 4 months ago
- Useful resources about phishing email analysis☆81Updated last month
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆77Updated 3 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆183Updated 8 months ago
- ☆43Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- ☆32Updated 4 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- A Python script for analyzing email files to extract IP addresses, URLs, headers, and attachments, with functionalities for defanging IPs…☆18Updated 5 months ago
- CLI tools for forensic investigation of Windows artifacts☆326Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆60Updated last year
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆390Updated 2 months ago