Hacking-Lab / SecurityOperationsCenterLinks
Security Operation Center Lab
☆19Updated 11 months ago
Alternatives and similar repositories for SecurityOperationsCenter
Users that are interested in SecurityOperationsCenter are comparing it to the libraries listed below
Sorting:
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆108Updated last year
- SIEM Cheat Sheet☆76Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆89Updated 3 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- ☆13Updated 2 years ago
- ☆35Updated 10 months ago
- ☆185Updated last year
- Some Threat Hunting queries useful for blue teamers☆128Updated 3 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Useful resources about phishing email analysis☆85Updated 7 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆132Updated last year
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆108Updated 6 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆32Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- ☆21Updated 6 years ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆22Updated this week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆57Updated 2 months ago
- Some important DFIR Resources☆83Updated 2 years ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆217Updated last year
- ☆41Updated 8 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- ☆34Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆98Updated last year
- ☆105Updated 4 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- ☆135Updated last year
- CSbyGB - Gabrielle B's new Blog!☆23Updated last month
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆67Updated last year
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago