L0p0w3r / Cyber-resource-listLinks
Cyber Security resource list
☆18Updated 9 months ago
Alternatives and similar repositories for Cyber-resource-list
Users that are interested in Cyber-resource-list are comparing it to the libraries listed below
Sorting:
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆101Updated last year
- Some Threat Hunting queries useful for blue teamers☆129Updated 3 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Cybersecurity Incident Response Plan☆108Updated 5 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 6 months ago
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- Security Scripts and Sources for daily usage.☆66Updated last month
- Automating Security Detection Engineering, published by Packt☆63Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 5 months ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Creating a resource to help build and manage an Insider Threat program.☆99Updated 9 months ago
- Resources To Learn And Understand SIGMA Rules☆181Updated 2 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆26Updated 7 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 10 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆140Updated 2 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆174Updated 2 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆122Updated last month
- This repository contains Splunk queries to hunt some anomalies☆44Updated 3 years ago
- Tools for simulating threats☆193Updated 2 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- SPL cheatsheet for Splunk.☆24Updated 2 years ago
- ☆45Updated 3 years ago
- A repository of my own Sigma detection rules.☆162Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆121Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 8 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆139Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆81Updated 3 years ago
- Mapping of open-source detection rules and atomic tests.☆178Updated 9 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆99Updated this week