jacobdjwilson / awesome-annual-security-reports
A curated list of annual cyber security reports
☆273Updated last week
Related projects: ⓘ
- A collection of companies that disclose adversary TTPs after they have been breached☆236Updated 4 months ago
- Awesome Security lists for SOC/CERT/CTI☆628Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆546Updated 2 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆189Updated 10 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆356Updated 8 months ago
- A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.☆312Updated 2 weeks ago
- ☆152Updated 6 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆176Updated 2 months ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆185Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆329Updated 3 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆436Updated 2 weeks ago
- A resource containing all the tools each ransomware gangs uses☆551Updated this week
- Playbooks for SOC Analysts☆119Updated last year
- CLI tools for forensic investigation of Windows artifacts☆296Updated last month
- Cyber Incident Response Team Playbook Battle Cards☆356Updated 4 months ago
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆81Updated 3 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆270Updated 4 months ago
- MISP Playbooks☆167Updated last month
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆348Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆802Updated this week
- ☆38Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆246Updated 7 months ago
- Repository resource for threat hunter☆157Updated 6 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆101Updated this week
- Awesome Incident Response☆257Updated 5 months ago
- Yet another Ransomware gang tracker☆304Updated this week
- A production ready Dockered MISP☆138Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆497Updated 3 months ago
- Map tracking ransomware, by OCD World Watch team☆383Updated 5 months ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆286Updated this week