A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks including Phishing Email Analysis & Brand Monitoring to fasten the incident response.
☆29Jun 22, 2022Updated 3 years ago
Alternatives and similar repositories for Security-Event-Analysis-Automation-Tool
Users that are interested in Security-Event-Analysis-Automation-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jan 31, 2023Updated 3 years ago
- A library implementing a generic SQL like query language.☆21Mar 25, 2026Updated 2 weeks ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Oct 15, 2024Updated last year
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆51Feb 14, 2026Updated last month
- ☆16Jul 8, 2024Updated last year
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Goldphish phishing server with ngrok tunneling support.☆19Sep 7, 2018Updated 7 years ago
- ☆11Jun 4, 2025Updated 10 months ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- ☆10Apr 29, 2023Updated 2 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- ☆10Oct 15, 2023Updated 2 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆197Mar 11, 2024Updated 2 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,468Sep 25, 2024Updated last year
- ☆11Dec 31, 2018Updated 7 years ago
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Collection of walkthroughs on various threat hunting techniques☆77Aug 3, 2020Updated 5 years ago
- ASW Card Validator library validates masking and card numbers, with the help of Luhn's algorithm using Angular. Identify card type VISA, …☆14Nov 9, 2024Updated last year
- Homebrew MCP : Comprehensive brew support for installing, upgrading, searching, and maintaining macOS packages.☆27Jun 23, 2025Updated 9 months ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Course Setup for the Cybersecurity Defender in 4 weeks course by Omar Santos☆20Jul 29, 2021Updated 4 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- A tool for detecting sensitive data in code repositories☆18Mar 26, 2026Updated 2 weeks ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- Wiki to collect Red Team infrastructure hardening resources☆32Sep 1, 2018Updated 7 years ago