isherwood-sec / detection-engineeringLinks
☆55Updated 3 weeks ago
Alternatives and similar repositories for detection-engineering
Users that are interested in detection-engineering are comparing it to the libraries listed below
Sorting:
- A starter pack of resources to help you get started in Detection Engineering.☆174Updated 2 months ago
- Some important DFIR Resources☆83Updated 2 years ago
- ☆187Updated last year
- SIEM Cheat Sheet☆76Updated 2 years ago
- MISP Playbooks☆219Updated last month
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆83Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆270Updated 7 months ago
- A curated repository of incident response playbooks☆107Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆102Updated last year
- ☆95Updated 3 months ago
- Windows Malware Investigation Scripts & Docs☆85Updated last year
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- ☆35Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆108Updated 6 months ago
- ☆42Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- ☆63Updated 2 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆284Updated this week
- ☆116Updated 5 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆200Updated this week
- ☆52Updated 2 years ago
- Automating Security Detection Engineering, published by Packt☆64Updated last year
- Harness the power of Splunk for your investigations☆140Updated last month
- Jupyter Notebooks for the Blue Team☆148Updated 7 months ago
- Tools for simulating threats☆197Updated 2 years ago
- Open Source Security Operations Center Documentation☆201Updated 4 months ago
- Practical Threat Detection Engineering, Published by Packt☆78Updated 2 years ago