hRun / awesome-cybersecurity-bookmarksLinks
A cybersecurity guy's curated list of useful browser bookmarks
☆14Updated 5 months ago
Alternatives and similar repositories for awesome-cybersecurity-bookmarks
Users that are interested in awesome-cybersecurity-bookmarks are comparing it to the libraries listed below
Sorting:
- Some important DFIR Resources☆83Updated 2 years ago
- SIEM Cheat Sheet☆75Updated last year
- Useful resources about phishing email analysis☆84Updated 6 months ago
- ☆66Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 2 years ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆79Updated 3 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 11 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 11 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆97Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆100Updated 9 months ago
- Cyber Underground General Intelligence Requirements☆94Updated last year
- Incident Response with Threat Intelligence, published by Packt☆51Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- ☆133Updated last year
- ☆13Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 5 months ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆112Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆19Updated 10 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- A collection of various SIEM rules relating to malware family groups.☆67Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆143Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆28Updated 7 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 2 months ago