SOC-Community / Awesome-SOCLinks
A collection of sources of documentation and best practices to build and run a SOC
☆60Updated 2 years ago
Alternatives and similar repositories for Awesome-SOC
Users that are interested in Awesome-SOC are comparing it to the libraries listed below
Sorting:
- MISP Playbooks☆206Updated last month
- A curated list of Awesome Threat Intelligence blogs☆69Updated 2 years ago
- A curated repository of incident response playbooks☆93Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆400Updated 2 months ago
- A curated list of Awesome Threat Intelligence Blogs☆437Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆96Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 4 months ago
- ☆182Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆114Updated last week
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆80Updated 4 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆231Updated this week
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 2 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 11 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated last month
- SIEM Cheat Sheet☆75Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆173Updated last month
- Resources To Learn And Understand SIGMA Rules☆180Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆118Updated 2 years ago
- Incident Response with Threat Intelligence, published by Packt☆51Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆696Updated 6 months ago
- Cyber Incident Response Team Playbook Battle Cards☆385Updated last year
- Useful resources about phishing email analysis☆84Updated 6 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- ☆37Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆86Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆593Updated this week
- ☆133Updated last year
- ☆53Updated 3 weeks ago