SOC-Community / Awesome-SOCLinks
A collection of sources of documentation and best practices to build and run a SOC
☆64Updated 2 years ago
Alternatives and similar repositories for Awesome-SOC
Users that are interested in Awesome-SOC are comparing it to the libraries listed below
Sorting:
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆404Updated 4 months ago
- A curated list of Awesome Threat Intelligence blogs☆80Updated 2 years ago
- MISP Playbooks☆211Updated 3 months ago
- A curated list of Awesome Threat Intelligence Blogs☆452Updated 2 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- A curated repository of incident response playbooks☆102Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆100Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 4 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆81Updated 3 weeks ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆256Updated 3 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆266Updated 6 months ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆120Updated last week
- ☆134Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆149Updated last week
- ☆39Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆246Updated last year
- ☆185Updated last year
- A very opinionated list of security tools☆128Updated 6 months ago
- ☆218Updated last year
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆237Updated this week
- NIST CSF Maturity Toolkit☆105Updated 4 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 9 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆120Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆178Updated last week
- Cybersecurity Incident Response Plan☆105Updated 5 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆197Updated last year
- Tools for simulating threats☆193Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆30Updated 2 weeks ago