Danishcx / Building-a-Cyber-Fortress-SOC-Lab-for-Attack-Defense-SimulationLinks
☆57Updated 2 months ago
Alternatives and similar repositories for Building-a-Cyber-Fortress-SOC-Lab-for-Attack-Defense-Simulation
Users that are interested in Building-a-Cyber-Fortress-SOC-Lab-for-Attack-Defense-Simulation are comparing it to the libraries listed below
Sorting:
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆56Updated last month
- ☆35Updated 9 months ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆102Updated 2 years ago
- ☆184Updated last year
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆108Updated 6 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆86Updated 3 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 4 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆106Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆57Updated 10 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- ☆12Updated 2 months ago
- ☆124Updated 2 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆115Updated last month
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 6 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆133Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- ☆41Updated 8 months ago
- ☆23Updated 7 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- ☆40Updated 8 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆74Updated this week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆196Updated last year
- A collection of CVEs weaponized by ransomware operators☆121Updated last week
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆107Updated 4 months ago
- Deny list generator for password filters☆25Updated last year
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆76Updated last year