Mohammad-Mirasadollahi / ThinkingSOCLinks
A new era for SOCs begins
☆23Updated 7 months ago
Alternatives and similar repositories for ThinkingSOC
Users that are interested in ThinkingSOC are comparing it to the libraries listed below
Sorting:
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆154Updated last week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆239Updated 4 months ago
- A tool for mapping cyber crime☆235Updated last week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆332Updated this week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆136Updated last month
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆34Updated 2 months ago
- ☆119Updated 7 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆120Updated this week
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆440Updated 3 months ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆214Updated this week
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆62Updated this week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 11 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated 11 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Updated 9 months ago
- A collection of methods to learn who the owner of an IP address is.☆223Updated 3 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆194Updated last month
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- ☆35Updated last year
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆70Updated last month
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆104Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆34Updated 9 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆64Updated 2 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆146Updated this week