AugmentedSecurityForce / -HOW-TO-Create_a_SOC_LABLinks
Create a SOC lab with SIEM, AD, Workstation, Firewall, Sysmon, IPS. Step by Step
☆30Updated 2 years ago
Alternatives and similar repositories for -HOW-TO-Create_a_SOC_LAB
Users that are interested in -HOW-TO-Create_a_SOC_LAB are comparing it to the libraries listed below
Sorting:
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 9 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Useful resources about phishing email analysis☆85Updated 7 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 5 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 5 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- SIEM Cheat Sheet☆76Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆128Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 10 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- Pwnspoof repository☆264Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆120Updated 2 years ago
- ☆74Updated last week
- A collection of various SIEM rules relating to malware family groups.☆69Updated last year
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆229Updated 11 months ago
- ☆160Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆117Updated 3 weeks ago
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- All of the Best Links and Resources on Cyber Security☆71Updated last month
- VirtualGHOST Detection Tool☆92Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago