A curated list of annual cyber security reports
☆1,018Mar 5, 2026Updated this week
Alternatives and similar repositories for awesome-annual-security-reports
Users that are interested in awesome-annual-security-reports are comparing it to the libraries listed below
Sorting:
- A curated list of Awesome Threat Intelligence Blogs☆508Feb 16, 2026Updated 3 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Nov 11, 2025Updated 3 months ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆257Updated this week
- Awesome Security lists for SOC/CERT/CTI☆1,271Updated this week
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆706Apr 21, 2025Updated 10 months ago
- A resource containing all the tools each ransomware gangs uses☆1,332Dec 24, 2025Updated 2 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,517Jan 5, 2026Updated 2 months ago
- ☆293Aug 30, 2025Updated 6 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Automating situational awareness for cloud penetration tests.☆2,303Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,635Feb 23, 2026Updated 2 weeks ago
- AIL framework - Analysis Information Leak framework☆885Mar 2, 2026Updated last week
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,636Updated this week
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,889Oct 1, 2025Updated 5 months ago
- Microsoft Threat Intelligence Security Tools☆1,948Feb 10, 2026Updated last month
- A curated list of Awesome Threat Intelligence resources☆9,872Jan 19, 2026Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆335Jan 12, 2026Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,272Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,148Dec 19, 2025Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- A repository of credential stealer formats☆250Jun 10, 2025Updated 9 months ago
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆772Feb 8, 2026Updated last month
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,633Mar 1, 2026Updated last week
- A curated list of tools for incident response☆8,842Jul 18, 2024Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆155Updated this week
- PowerShell module for Office 365 and Azure log collection☆279Sep 22, 2025Updated 5 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆594Dec 4, 2025Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,467Mar 2, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,632Mar 2, 2026Updated last week
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆647Nov 7, 2025Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,056Dec 11, 2024Updated last year
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,271Feb 5, 2026Updated last month
- A repo to conduct vulnerability enrichment.☆738Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,208Feb 20, 2026Updated 2 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year