Useful resources for SOC Analyst and SOC Analyst candidates.
☆928Aug 28, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-soc-analyst
Users that are interested in awesome-soc-analyst are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆199Mar 11, 2024Updated 2 years ago
- SOC Interview Questions☆1,294Sep 10, 2024Updated last year
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,719Apr 29, 2026Updated last week
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆105Apr 13, 2026Updated 3 weeks ago
- Useful resources about phishing email analysis☆86Jan 31, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Playbooks for SOC Analysts☆707Dec 11, 2022Updated 3 years ago
- Tools and Techniques for Blue Team / Incident Response☆4,018Mar 27, 2025Updated last year
- Practical Windows Forensics Training☆763Feb 16, 2026Updated 2 months ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,265Jul 15, 2024Updated last year
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆47Apr 13, 2023Updated 3 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,437Updated this week
- CLI tools for forensic investigation of Windows artifacts☆352Jul 21, 2025Updated 9 months ago
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,838Apr 29, 2026Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,580Jan 5, 2026Updated 4 months ago
- ☆488Oct 7, 2022Updated 3 years ago
- OSCP Cheatsheet by Sai Sathvik Ruppa☆1,181Oct 3, 2024Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆245Sep 6, 2024Updated last year
- ☆43Mar 6, 2023Updated 3 years ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆770Aug 28, 2025Updated 8 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,403Apr 23, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repository contains tutorials and tools for working with IP search engines. Search engines that search all devices connected to the …☆318Aug 27, 2025Updated 8 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,690Apr 13, 2026Updated 3 weeks ago
- Free hands-on digital forensics labs for students and faculty☆2,596Mar 21, 2026Updated last month
- PowerShell Digital Forensics & Incident Response Scripts.☆783Jan 14, 2026Updated 3 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆679Feb 17, 2026Updated 2 months ago
- OSWE, OSEP, OSED, OSEE☆3,813Jan 2, 2026Updated 4 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆894Dec 28, 2025Updated 4 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆468Feb 18, 2026Updated 2 months ago
- Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool☆918Oct 6, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,589Jan 4, 2024Updated 2 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,135Updated this week
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆485Apr 17, 2025Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆732Apr 2, 2026Updated last month
- You didn't think I'd go and leave the blue team out, right?☆1,743Apr 14, 2026Updated 3 weeks ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆622Apr 3, 2026Updated last month
- Burp Suite Certified Practitioner Exam Study☆1,383Mar 12, 2026Updated last month