A new era for SOCs begins
☆24Jun 4, 2025Updated 11 months ago
Alternatives and similar repositories for ThinkingSOC
Users that are interested in ThinkingSOC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert Sigma rules to SIEM queries, directly in your browser.☆114Updated this week
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆42Apr 24, 2026Updated 2 weeks ago
- ☆19Sep 2, 2024Updated last year
- Official Deployment Scripts for Learning Locker☆11Apr 30, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆23Apr 20, 2026Updated 2 weeks ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Apr 21, 2026Updated 2 weeks ago
- Open source BaaS (backend as a service). Built with Laravel☆13Jan 24, 2018Updated 8 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Interactive CRQ Monte Carlo simulation tool for quantifying cybersecurity risk using FAIR methodology. Built for EU SMBs, vCISOs, and sec…☆30Dec 5, 2025Updated 5 months ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆27Jan 6, 2025Updated last year
- Config files for my GitHub profile.☆14May 7, 2023Updated 3 years ago
- ☆28Aug 24, 2025Updated 8 months ago
- VulnReach builds on standard SCA output by adding reachability context - proving through static analysis, taint tracking, and live runtim…☆20Apr 27, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆290Apr 10, 2026Updated 3 weeks ago
- ☆55Feb 22, 2026Updated 2 months ago
- UNI-2021-2025☆10Aug 7, 2024Updated last year
- forka ai fazeno favor vai q cai mia conta 👍☆10Aug 29, 2022Updated 3 years ago
- ☆12Apr 21, 2026Updated 2 weeks ago
- Red Team Server (RTS)☆16Apr 16, 2026Updated 3 weeks ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆47Updated this week
- YouTube music API client library based on Innertube API for Dart & Flutter☆12Sep 26, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- ☆24Jan 29, 2026Updated 3 months ago
- sl0ppy-PrivescTaskCreator.ps1☆41Oct 8, 2025Updated 7 months ago
- Prompt-based pipeline for extracting procedural knowledge graphs from text with LLMs☆18Feb 17, 2026Updated 2 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 5 months ago
- Collect AWS logs and query them instantly with SQL! Open source CLI. No DB required.☆16Apr 22, 2026Updated 2 weeks ago
- The intake formats supported by SEKOIA.IO☆21Updated this week
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆95Apr 19, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A torrent stream player.☆16Oct 8, 2023Updated 2 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- ☆44Jul 9, 2024Updated last year
- ☆16Apr 16, 2015Updated 11 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 6 months ago
- OWASP Foundation Web Respository☆27Dec 22, 2025Updated 4 months ago
- 🍰 Freshly baked builds from HEAD.☆10Nov 6, 2024Updated last year