A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.
☆22Mar 18, 2026Updated last week
Alternatives and similar repositories for SOC-Assistant-Guide
Users that are interested in SOC-Assistant-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 3 weeks ago
- The GDPR-compliant Privacy Policy template/sample provided at https://gdpr.eu, adapted into markdown format.☆13May 25, 2021Updated 4 years ago
- FLUX: Format for LLM Understanding and eXchange☆15Nov 14, 2025Updated 4 months ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆25Updated this week
- Repository for tools used for the OSCP☆23Sep 18, 2025Updated 6 months ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 3 weeks ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- ☆22May 1, 2025Updated 10 months ago
- This repo contains all the code needed to run the Cognito Vue workshop☆14Jul 16, 2021Updated 4 years ago
- Userscripts developed by me☆18Dec 25, 2024Updated last year
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Sep 20, 2024Updated last year
- Examples of OpenPLC IEC 61131-3 Editor with CONTROLLINO☆21Dec 6, 2024Updated last year
- Cisco Networks Add-on☆14Mar 16, 2026Updated last week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆13Aug 19, 2022Updated 3 years ago
- AI Goat - Learn AI security by attacking and defending a real AI-powered e-commerce application. Built for Red Teamers, security research…☆25Mar 14, 2026Updated last week
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 6 months ago
- Splunk Apps and Documentation☆17Nov 4, 2025Updated 4 months ago
- YouTube Revanced patching with Revancify Tools (Root & Non-Root)☆11Oct 26, 2025Updated 4 months ago
- ☆15Aug 25, 2021Updated 4 years ago
- A highly efficient and powerful Go script designed to detect sensitive data leaks in JavaScript files.☆21Dec 9, 2025Updated 3 months ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 4 years ago
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆16Sep 28, 2024Updated last year
- Python-based static analyzer for Android APKs that extracts attack surface and flags high-risk vulnerability patterns with lightweight ta…☆54Feb 22, 2026Updated last month
- AircrackNG commands guide☆21Jun 24, 2018Updated 7 years ago
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆32Mar 17, 2026Updated last week
- Deep and Dark Web OSINT Tool☆10Sep 18, 2018Updated 7 years ago
- CoreUI based Keycloak login theme☆23Aug 20, 2023Updated 2 years ago
- A web application based on Python framework Django , that brings together farmers and retailers on common platform for commodity bidding.☆10Oct 21, 2019Updated 6 years ago
- Windows 10 registry tweak performance hacks.☆10Jun 14, 2022Updated 3 years ago
- ☆29Aug 24, 2025Updated 7 months ago
- A new era for SOCs begins☆24Jun 4, 2025Updated 9 months ago
- Security Monitoring using Wazuh, published by Packt☆38Mar 2, 2026Updated 3 weeks ago
- DeepSeek Pentest AI - Burp Suite extension☆57Sep 14, 2025Updated 6 months ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Documentation about ReaQta DeStra® Engine☆11Feb 7, 2022Updated 4 years ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year