adhdproject / awesome-active-defenseLinks
an awesome list of active defense resources
☆120Updated 4 years ago
Alternatives and similar repositories for awesome-active-defense
Users that are interested in awesome-active-defense are comparing it to the libraries listed below
Sorting:
- Web application to create indexes for GIAC certification examinations.☆142Updated 2 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆70Updated 5 years ago
- Tools for simulating threats☆185Updated last year
- Resources To Learn And Understand SIGMA Rules☆175Updated 2 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- ☆77Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆251Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- ☆44Updated 2 years ago
- A curated list of awesome things related to TheHive & Cortex☆180Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- A list of my personal projects☆177Updated 2 years ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 5 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 5 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆85Updated last year
- A curated list of KAPE-related resources☆168Updated last month
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago