SOC-Community / Awesome-SOCLinks
A collection of sources of documentation and best practices to build and run a SOC
☆55Updated 2 years ago
Alternatives and similar repositories for Awesome-SOC
Users that are interested in Awesome-SOC are comparing it to the libraries listed below
Sorting:
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆90Updated last year
- SIEM Cheat Sheet☆74Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆117Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆256Updated 3 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆79Updated 3 months ago
- MISP Playbooks☆203Updated last week
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆26Updated 5 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆96Updated 7 months ago
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Practical Threat Detection Engineering, Published by Packt☆72Updated last year
- ☆105Updated last month
- A curated repository of incident response playbooks☆87Updated last year
- A curated list of Awesome Threat Intelligence blogs☆65Updated last year
- Incident Response with Threat Intelligence, published by Packt☆52Updated last year
- an awesome list of active defense resources☆122Updated 4 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- ☆35Updated last year
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆45Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆82Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 7 months ago
- Tools for simulating threats☆186Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 11 months ago
- NIST CSF Maturity Toolkit☆42Updated 2 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 9 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Resources To Learn And Understand SIGMA Rules☆177Updated 2 years ago