hRun / awesome-cybersecurity-bookmarksLinks
A cybersecurity guy's curated list of useful browser bookmarks
☆14Updated 4 months ago
Alternatives and similar repositories for awesome-cybersecurity-bookmarks
Users that are interested in awesome-cybersecurity-bookmarks are comparing it to the libraries listed below
Sorting:
- SIEM Cheat Sheet☆74Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- ☆66Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆92Updated last year
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Updated 3 years ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated last year
- Linux Baseline and Forensic Triage Tool - BETA☆55Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 11 months ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆41Updated last year
- Useful resources about phishing email analysis☆84Updated 5 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆97Updated 8 months ago
- Cyber Underground General Intelligence Requirements☆94Updated last year
- A list of resources to build a information security team.☆13Updated 4 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆39Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆143Updated last year
- Conference presentations☆47Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated 2 years ago
- Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detection…☆18Updated last year
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- Quick SOC L1 ticket structure☆37Updated 6 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆81Updated last month
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 4 months ago