H3llKa1ser / SOC-Assistant-GuideLinks
A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.
☆19Updated 10 months ago
Alternatives and similar repositories for SOC-Assistant-Guide
Users that are interested in SOC-Assistant-Guide are comparing it to the libraries listed below
Sorting:
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆76Updated 2 months ago
- Playbooks for SOC Analysts☆611Updated 2 years ago
- ☆218Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆393Updated last year
- ☆185Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆715Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆345Updated 3 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆227Updated last year
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.☆315Updated 2 years ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆111Updated 8 months ago
- ☆23Updated last year
- Hands-on projects on Static and Dynamic malware analysis with real-world tools.☆80Updated last year
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆82Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆406Updated 5 months ago
- ☆16Updated 11 months ago
- Open Source Security Operations Center Documentation☆198Updated 4 months ago
- Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam pr…☆81Updated 2 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆439Updated last week
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆414Updated 2 months ago
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆109Updated last year
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆252Updated last week
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆36Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆384Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆267Updated 4 months ago
- Practical Windows Forensics Training☆695Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆611Updated 2 months ago
- ☆55Updated last week
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆371Updated 2 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- Windows Malware Investigation Scripts & Docs☆85Updated 11 months ago