A curated repository of incident response playbooks
☆117Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-playbooks
Users that are interested in awesome-playbooks are comparing it to the libraries listed below
Sorting:
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 4 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- ☆195Mar 11, 2024Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆424May 10, 2024Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Mar 2, 2026Updated last week
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆42Oct 10, 2024Updated last year
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated 2 weeks ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,544Jul 28, 2024Updated last year
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- THOR APT Scanner User Manual☆20Updated this week
- A preconfigured Velociraptor triage collector☆76Mar 2, 2026Updated last week
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆33Oct 16, 2019Updated 6 years ago
- AIL project training materials☆39Feb 24, 2026Updated last week
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 10 months ago
- An open source platform to support analysts to organise their case and tasks☆126Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,931Jan 20, 2026Updated last month
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Feb 27, 2026Updated last week
- ☆17Sep 29, 2023Updated 2 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆215May 23, 2020Updated 5 years ago
- Threat Simulation Indexes☆39Jan 9, 2026Updated 2 months ago
- ☆75Apr 3, 2025Updated 11 months ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Playbooks for SOC Analysts☆684Dec 11, 2022Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆414Nov 8, 2025Updated 4 months ago