BadSamuraiDev / awesome-security-ce
Awesome List of Enterprise Security Tools' Community Edition
☆14Updated last year
Alternatives and similar repositories for awesome-security-ce:
Users that are interested in awesome-security-ce are comparing it to the libraries listed below
- Collection of Jupyter Notebooks by @fr0gger_☆162Updated last month
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆210Updated 3 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- an awesome list of active defense resources☆120Updated 4 years ago
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆77Updated this week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- A curated list of KAPE-related resources☆166Updated last month
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- A lab environment for learning about MSTICPy☆36Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year
- ☆87Updated 2 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- The FASTEST way to consume threat intel.☆68Updated last year
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 4 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- ☆65Updated 2 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- A template for writing a condensed course index leveraging LaTeX indexing☆102Updated last month
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- Incident Response documents and tooling☆70Updated last year
- ☆42Updated 2 years ago
- Collection of scripts provided for public use☆34Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Wrap any binary into a cached webserver☆53Updated 3 years ago