Create a SOC lab with SIEM, AD, Workstation, Firewall, Sysmon, IPS. Step by Step
☆30Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for -HOW-TO-Create_a_SOC_LAB
Users that are interested in -HOW-TO-Create_a_SOC_LAB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Dec 4, 2025Updated 3 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆36Aug 26, 2020Updated 5 years ago
- DNP3 Cyber-attack datasets☆15Mar 9, 2017Updated 9 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- The Scorebot Engine is a platform that allows scoring, host checking and other cool stuff☆10Nov 10, 2024Updated last year
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Deploys ACME Fitness application across different environments☆21Mar 11, 2026Updated last week
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆17Jun 29, 2020Updated 5 years ago
- ☆19May 30, 2022Updated 3 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- This repo contains the installation guide and EFI files required to get a perfectly functional macOS hackintosh on your Lenovo Thinkbook …☆14Jun 2, 2025Updated 9 months ago
- A list of resources to build a information security team.☆14Feb 10, 2021Updated 5 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- A GUI to query the API of abuse.ch.☆69Jul 10, 2022Updated 3 years ago
- Pull Hashes Decryption From Online Sources Using Python☆16Jun 25, 2024Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- ☆13Mar 28, 2024Updated last year
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- Scans NTFS permissions and ensures that BUILTIN\Administrators and NT AUTHORITY\SYSTEM have full control to every file and folder☆45Feb 8, 2025Updated last year
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Nov 15, 2023Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- ☆12Jul 27, 2017Updated 8 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- this repo is for red team process and tools collection☆29Aug 29, 2021Updated 4 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Jan 1, 2022Updated 4 years ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 10 months ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago