SecOpsTeam / awesome-cybersecurity-blueteam
š”ļø A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
ā12Updated 5 years ago
Alternatives and similar repositories for awesome-cybersecurity-blueteam:
Users that are interested in awesome-cybersecurity-blueteam are comparing it to the libraries listed below
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.ā33Updated 7 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.ā38Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to cā¦ā16Updated 5 years ago
- Virtual Security Operations Centerā50Updated last year
- A curated list of FOSS software appliances for building a SOCā18Updated 4 years ago
- Quick SOC L1 ticket structureā35Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.ā32Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/contentā87Updated last year
- Reference sheet for Threat Hunting Professional Courseā25Updated 6 years ago
- Repository for SPEED SIEM Use Case Frameworkā53Updated 4 years ago
- ā12Updated 3 years ago
- ā19Updated 4 years ago
- Resources from the Security Presentationā11Updated 5 months ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networksā25Updated 4 years ago
- ā32Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.ā40Updated 2 years ago
- Hunting Newly Registered Domainsā10Updated 6 years ago
- Parse .nessus file(s) and shows output in interactive UIā150Updated 11 months ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloudā52Updated 3 years ago
- Threat Hunter's Knowledge Baseā22Updated 3 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.ā48Updated 5 years ago
- Sharing Threat Hunting runbooksā25Updated 5 years ago
- Resources for AD penetration testing and securityā30Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedureā15Updated 2 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverageā24Updated 5 years ago
- Tool used to perform threat intelligence against packet dataā35Updated 2 months ago
- ā21Updated 3 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Securityā69Updated 2 years ago
- The New Hacking Frameworkā18Updated 7 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.ā32Updated 5 years ago