Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam prep and skill-building in blue team operations.
☆119Feb 26, 2026Updated last month
Alternatives and similar repositories for SOC-Analyst-Notes
Users that are interested in SOC-Analyst-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆105Updated this week
- ☆23Apr 10, 2026Updated last week
- Master Linux from beginner to advanced: commands, shell scripting, system administration, networking, security, and automation with real-…☆74Oct 24, 2025Updated 5 months ago
- This repository covers computer networking fundamentals and advanced concepts including the OSI model, TCP/IP protocols, IP addressing & …☆75Aug 8, 2025Updated 8 months ago
- Repository of Digital Forensics experiments, including procedures, screenshots, and tools. Built for coursework and to demonstrate practi…☆59Oct 27, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆47Apr 13, 2023Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Apr 7, 2026Updated last week
- ☆13Mar 12, 2025Updated last year
- Enrich your investigations on IPs, Domains etc. with OSINT☆62Apr 4, 2024Updated 2 years ago
- Creating a remote keylogger in Python and disguising the executable as a JPEG.☆13Aug 30, 2023Updated 2 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- A walkthrough of creating and using the Azure environment and Microsoft Sentinel to track attacks and plot attacks on a live map.☆24Mar 26, 2023Updated 3 years ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆53Apr 5, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆35Nov 13, 2025Updated 5 months ago
- This project automates SOC workflows using Wazuh, Shuffle, and TheHive. It involves setting up a Windows 10 client with Sysmon and Ubuntu…☆38Jun 7, 2024Updated last year
- Quick commands for pentesting/No typing!☆18Nov 21, 2023Updated 2 years ago
- Seamless mode integration for WSL☆11Dec 29, 2023Updated 2 years ago
- CABTA (Blue Team Assistant) - AI-Powered SOC Platform for Threat Analysis, IOC Investigation & Email Forensics☆63Mar 19, 2026Updated 3 weeks ago
- Interview questions for SOC Analyst, Sec Engineering, etc☆17Apr 27, 2024Updated last year
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Collection of Snort 2/3 rules.☆40Jun 22, 2018Updated 7 years ago
- Cyber Attack/Defense home lab using Sliver, LimaCharlie [SIEM], & VM's to simulate C&C, Threat Detection, etc.☆12Aug 31, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆51Dec 19, 2022Updated 3 years ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 9 months ago
- Profile layout☆15Sep 11, 2025Updated 7 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- ☆12Oct 15, 2024Updated last year
- Useful resources for SOC Analyst and SOC Analyst candidates.☆914Aug 28, 2023Updated 2 years ago
- Scripts and Samples for the KQL Pluralsight Course Created in 2022☆23Jan 6, 2023Updated 3 years ago
- Random OSINT idea tool thing☆25Jan 11, 2026Updated 3 months ago
- yara detection rules for hunting with the threathunting-keywords project☆159May 11, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rules I have researched for Microsoft Sentinel in my spare time. If someone wants to offer me a job I am open. Anyone can use this. Pleas…☆17Mar 29, 2026Updated 2 weeks ago
- Extracts faces from youtube videos☆18Nov 7, 2023Updated 2 years ago
- Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Di…☆23Feb 27, 2024Updated 2 years ago
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,697Apr 11, 2026Updated last week
- ☆16Jul 8, 2024Updated last year
- Playbooks for SOC Analysts☆701Dec 11, 2022Updated 3 years ago
- Bug bounty bot for channel☆16Dec 10, 2022Updated 3 years ago