ThreatIntelligenceLab / LinkedIn_ThreatIntelligenceCompaniesLinks
☆9Updated last year
Alternatives and similar repositories for LinkedIn_ThreatIntelligenceCompanies
Users that are interested in LinkedIn_ThreatIntelligenceCompanies are comparing it to the libraries listed below
Sorting:
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆260Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- Open Source Security Operations Center Documentation☆188Updated 2 weeks ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆265Updated this week
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆15Updated last year
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆19Updated this week
- A curated list of LLM driven Cyber security Resources☆32Updated last month
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆32Updated last month
- MISP Playbooks☆206Updated last month
- A starter pack of resources to help you get started in Detection Engineering.☆132Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆92Updated last year
- ☆51Updated 3 weeks ago
- A curated repository of incident response playbooks☆92Updated 2 years ago
- Intelligence Architecture Mind Map☆132Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 7 months ago
- ☆47Updated 2 years ago
- A list of Splunk queries that I've collected and used over time.☆85Updated 4 years ago
- Tools for simulating threats☆188Updated last year
- ☆182Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Windows Malware Investigation Scripts & Docs☆83Updated 8 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆61Updated 3 weeks ago
- Config files for my GitHub profile.☆14Updated 2 years ago
- This repository contains Community and Field contributed content for LogScale☆249Updated last week
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆146Updated last month
- Harness the power of Splunk for your investigations☆116Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆97Updated 8 months ago