SOC-Community / Awesome-SOCLinks
A collection of sources of documentation and best practices to build and run a SOC
☆55Updated 2 years ago
Alternatives and similar repositories for Awesome-SOC
Users that are interested in Awesome-SOC are comparing it to the libraries listed below
Sorting:
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆254Updated 2 months ago
- MISP Playbooks☆201Updated 3 months ago
- SIEM Cheat Sheet☆73Updated last year
- A curated list of Awesome Threat Intelligence blogs☆63Updated last year
- an awesome list of active defense resources☆120Updated 4 years ago
- Practical Threat Detection Engineering, Published by Packt☆71Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆112Updated this week
- Resources To Learn And Understand SIGMA Rules☆175Updated 2 years ago
- ☆104Updated last week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆94Updated last week
- ☆92Updated 2 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- AI-Powered Dark Web OSINT Tool☆72Updated last month
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated last month
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- Tools for simulating threats☆185Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆45Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- A curated repository of incident response playbooks☆85Updated last year
- Incident Response documents and tooling☆74Updated last year
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆167Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- God Mode Detection Rules☆134Updated 9 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last week
- ☆59Updated 4 years ago