L0p0w3r / Cyber-resource-list
Cyber Security resource list
☆17Updated 2 months ago
Alternatives and similar repositories for Cyber-resource-list:
Users that are interested in Cyber-resource-list are comparing it to the libraries listed below
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆50Updated last year
- ☆57Updated 3 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆16Updated last month
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- Security Scripts and Sources for daily usage.☆56Updated 2 weeks ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆152Updated 4 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- Practical Threat Detection Engineering, Published by Packt☆67Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated 10 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆77Updated 3 years ago
- ☆19Updated 3 years ago
- Advanced Threat Hunting: Ransomware Group☆20Updated 3 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆117Updated 3 weeks ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆250Updated last year
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆72Updated 5 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Resources To Learn And Understand SIGMA Rules☆174Updated 2 years ago
- Useful resources about phishing email analysis☆81Updated 2 months ago
- ☆46Updated 3 weeks ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆112Updated last year
- This repository contains Splunk queries to hunt some anomalies☆40Updated 2 years ago