Security Operation Center Lab
☆20Oct 8, 2024Updated last year
Alternatives and similar repositories for SecurityOperationsCenter
Users that are interested in SecurityOperationsCenter are comparing it to the libraries listed below
Sorting:
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- ☆20Aug 4, 2019Updated 6 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated last month
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Nov 25, 2020Updated 5 years ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 7 months ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- ☆10Jul 8, 2024Updated last year
- MISP to Microsoft Defender integration☆16Updated this week
- ☆49Jan 14, 2025Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 7 months ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines and technical resou…☆14Apr 9, 2022Updated 3 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- Stuff for the DEFCON 24 Car Hacking Village Badge☆13Sep 4, 2016Updated 9 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆39Sep 10, 2025Updated 5 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Aug 25, 2024Updated last year
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- ☆32Feb 13, 2026Updated 2 weeks ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆18Oct 27, 2023Updated 2 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- ☆13Jun 14, 2024Updated last year
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago