infosecB / awesome-detection-engineeringLinks
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
☆1,067Updated 3 months ago
Alternatives and similar repositories for awesome-detection-engineering
Users that are interested in awesome-detection-engineering are comparing it to the libraries listed below
Sorting:
- Incident Response Methodologies 2022☆1,073Updated 5 months ago
- A concise, directive, specific, flexible, and free incident response plan template☆737Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,519Updated 3 weeks ago
- A curated list of annual cyber security reports☆635Updated last week
- A repository of curated datasets from various attacks☆679Updated this week
- A knowledge base of actionable Incident Response techniques☆650Updated 3 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆691Updated 5 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆711Updated 8 months ago
- SIEM Tactics, Techiques, and Procedures☆669Updated this week
- A curated list of Awesome Threat Intelligence Blogs☆452Updated 2 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆943Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆685Updated last month
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆891Updated last year
- Awesome Security lists for SOC/CERT/CTI☆1,128Updated this week
- Splunk Security Content☆1,508Updated this week
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆417Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆608Updated 2 months ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆909Updated last month
- Playbooks for SOC Analysts☆603Updated 2 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆629Updated last year
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆701Updated last year
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,199Updated 2 weeks ago
- Splunk Boss of the SOC version 3 dataset.☆376Updated 5 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,509Updated last year
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- A python module for working with ATT&CK☆601Updated this week
- A framework for developing alerting and detection strategies for incident response.☆794Updated last month
- A collection of resources for Threat Hunters☆903Updated 11 months ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,360Updated this week