L0p0w3r / Cyber-resource-list
Cyber Security resource list
☆17Updated 3 months ago
Alternatives and similar repositories for Cyber-resource-list:
Users that are interested in Cyber-resource-list are comparing it to the libraries listed below
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Security Scripts and Sources for daily usage.☆58Updated 2 weeks ago
- ☆47Updated 2 weeks ago
- ☆58Updated 3 years ago
- ☆74Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- MISP to Sentinel integration☆64Updated 2 weeks ago
- Elastic version of SOC prime watcher rules☆29Updated 6 months ago
- ☆32Updated 5 months ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆53Updated last year
- ☆44Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆63Updated 3 weeks ago
- Slides of my public talks☆55Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated 3 weeks ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆88Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆29Updated this week
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 2 months ago
- ☆102Updated 2 weeks ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆72Updated last week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆25Updated 5 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 11 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago