Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
☆106Apr 13, 2026Updated 3 weeks ago
Alternatives and similar repositories for soc-ressources
Users that are interested in soc-ressources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam pr…☆122Feb 26, 2026Updated 2 months ago
- This repository is dedicated to the SOC (Security Operations Center) Analyst course. It contains all the necessary resources, notes, scri…☆17Aug 31, 2024Updated last year
- ☆23Apr 20, 2026Updated 2 weeks ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆928Aug 28, 2023Updated 2 years ago
- A curated awesome list of lists of interview questions. Feel free to contribute!☆23Jul 24, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Enumerate typosquatting, IDN homograph, bitsquatting, and visual spoofing candidates for red team engagements, threat hunting, and brand …☆11Mar 28, 2026Updated last month
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆47Apr 13, 2023Updated 3 years ago
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,719Apr 29, 2026Updated last week
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- CABTA (Blue Team Assistant) - AI-Powered SOC Platform for Threat Analysis, IOC Investigation & Email Forensics☆67Mar 19, 2026Updated last month
- Interview questions for SOC Analyst, Sec Engineering, etc☆17Apr 27, 2024Updated 2 years ago
- Playbooks for SOC Analysts☆712Dec 11, 2022Updated 3 years ago
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 5 months ago
- SOC Analyst Level 1 Replacement using RAG LLM☆29Aug 16, 2024Updated last year
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆18Jul 6, 2024Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs r…☆140Apr 15, 2026Updated 3 weeks ago
- IOC/Hash scanner and IDS layer 4 designed to be portable and fast☆27Jan 28, 2026Updated 3 months ago
- This tool will be invaluable for: SIEM Testing - Generate realistic multi-source logs Security Training - Reproducible scenarios for educ…☆42Feb 11, 2026Updated 2 months ago
- ☆68Mar 6, 2022Updated 4 years ago
- Power Prompt - Enhance ChatGPT & OpenAi interaction. Seamless conversations. Choose models, save templates, set temp, length & tokens.☆19Feb 15, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The New Hacking Framework☆18Apr 26, 2017Updated 9 years ago
- Tools for OSINT in Emirates☆27Apr 13, 2025Updated last year
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- A cheat sheet for the new post quantum cryptography algorithms☆24Jun 9, 2025Updated 10 months ago
- Resources for the Customizing Chef book☆11Sep 12, 2014Updated 11 years ago
- This script automates the installation of 50 OSINT tools for reconnaissance and information gathering.☆38Feb 23, 2024Updated 2 years ago
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 11 months ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Official Deployment Scripts for Learning Locker☆11Apr 30, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Utility to quickly view bidirectional encodings for code hosted online☆23Nov 2, 2021Updated 4 years ago
- ☆26Jan 15, 2025Updated last year
- ☆12Jul 15, 2022Updated 3 years ago
- We took PersistenceSniper, merged it with Python, and misspelled it on purpose. Meet PyrsistenceSniper.☆82Mar 30, 2026Updated last month
- AI-powered phishing & threat-analysis platform to automatically inspect, classify, and report suspicious emails, files, URLs, IPs, and ha…☆81Apr 30, 2026Updated last week
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆61Nov 24, 2025Updated 5 months ago
- Webhook endpoint for Fireflies transcripts with intent detection☆20Nov 1, 2024Updated last year