SOC-Community / Awesome-SOC
A collection of sources of documentation and best practices to build and run a SOC
☆48Updated 2 years ago
Alternatives and similar repositories for Awesome-SOC:
Users that are interested in Awesome-SOC are comparing it to the libraries listed below
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Tools for simulating threats☆183Updated last year
- MISP Playbooks☆188Updated last month
- SIEM Cheat Sheet☆73Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆183Updated 3 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆231Updated this week
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆112Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆136Updated 3 weeks ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆50Updated 11 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆124Updated 8 months ago
- Resources To Learn And Understand SIGMA Rules☆173Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆28Updated 5 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- God Mode Detection Rules☆134Updated 7 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆100Updated 7 months ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated last week
- A curated list of KAPE-related resources☆164Updated this week
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆77Updated 3 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆117Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Useful resources about phishing email analysis☆81Updated last month
- Incident Response documents and tooling☆69Updated last year
- A curated repository of incident response playbooks☆74Updated last year
- A cybersecurity game in Azure Data Explorer☆168Updated 8 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆124Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- Security Scripts and Sources for daily usage.☆55Updated last week
- Building a consolidated RSS feed for articles about cyberattacks☆66Updated this week