OTRF / infosec-jupyter-bookView external linksLinks
The Infosec Community Definitive Guide to Jupyter Notebooks
☆131Oct 17, 2020Updated 5 years ago
Alternatives and similar repositories for infosec-jupyter-book
Users that are interested in infosec-jupyter-book are comparing it to the libraries listed below
Sorting:
- Building environments to replicate small networks and deploy applications☆330Jan 9, 2026Updated last month
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆586Jan 22, 2025Updated last year
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Collection of Jupyter Notebooks by @fr0gger_☆191Dec 16, 2025Updated 2 months ago
- Open Source Security Events Metadata (OSSEM)☆1,286Feb 27, 2023Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Interactive Azure Sentinel Notebooks provides security insights and actions to investigate anomalies and hunt for malicious behaviors.☆614Oct 17, 2025Updated 4 months ago
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- Microsoft Threat Intelligence Security Tools☆1,940Feb 10, 2026Updated last week
- Python client for DFIR-IRIS☆25Aug 19, 2024Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Mar 24, 2025Updated 10 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 4 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆800Jan 14, 2026Updated last month
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated last month
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- The Hunting ELK☆3,911Jun 1, 2024Updated last year
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆545May 6, 2025Updated 9 months ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,634Updated this week
- Deploy customizable Active Directory labs in Azure - automatically.☆430Dec 5, 2024Updated last year
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- A lab environment for learning about MSTICPy☆38Feb 3, 2023Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆713Nov 14, 2025Updated 3 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆412Nov 8, 2025Updated 3 months ago