danieleperera / SocAnalystArsenal
Quick SOC L1 ticket structure
☆35Updated 5 years ago
Alternatives and similar repositories for SocAnalystArsenal:
Users that are interested in SocAnalystArsenal are comparing it to the libraries listed below
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- Repository of public reference frameworks for the DFIR community.☆109Updated last year
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆52Updated 5 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- ☆28Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆75Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆51Updated 3 years ago
- ☆64Updated 2 years ago
- Useful resources about phishing email analysis☆77Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆110Updated last year
- ☆42Updated 2 years ago
- ☆116Updated 11 months ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- Resources from the Security Presentation☆11Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago