SANS has a massive list of posters available for quick reference to aid you in your security learning.
☆81Oct 22, 2021Updated 4 years ago
Alternatives and similar repositories for SANS-Posters
Users that are interested in SANS-Posters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Security Content for the PEAK Threat Hunting Framework☆47Feb 15, 2024Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆43Jun 27, 2021Updated 4 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆69Apr 29, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 4 years ago
- Field guide to gather low-hanging fruits☆15Mar 20, 2025Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 6 months ago
- Repository for storage of Axon Rapid Response related queries, scripts and more☆10Jul 22, 2025Updated 9 months ago
- CuteRAT is a stealthy remote access tool without any dependencies☆17Sep 12, 2023Updated 2 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Demo app for using Android Paging Library 3 with a content provider☆11Jun 26, 2020Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- ☆15Nov 22, 2022Updated 3 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Master-in-Devops-Engineering-MDE-Session-Notes☆13Jul 28, 2025Updated 9 months ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆28May 6, 2024Updated 2 years ago
- ☆17Oct 26, 2022Updated 3 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- A list of resources for AI engineers☆23Aug 3, 2025Updated 9 months ago
- Native android video chat application implemented using WebRTC and Firebase Database as signaler☆20Apr 6, 2018Updated 8 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- Button loading animation , chip loading animation , button/chip for showing loader☆19May 25, 2024Updated last year
- ☆40Aug 27, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆20Aug 30, 2024Updated last year
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆13May 7, 2025Updated last year
- Beginners Guide to Hunting for Threats☆19Apr 26, 2025Updated last year
- Damn Vulnerable Rails app☆14Sep 20, 2012Updated 13 years ago
- ☆34Feb 27, 2018Updated 8 years ago
- Ransomware Simulator for Red/Blue teams to test their defences.☆20Apr 4, 2022Updated 4 years ago