luduslibrum / awesome-playbooksView external linksLinks
A curated repository of incident response playbooks
☆114Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-playbooks
Users that are interested in awesome-playbooks are comparing it to the libraries listed below
Sorting:
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- ☆193Mar 11, 2024Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆52Sep 1, 2023Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆426May 10, 2024Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Feb 9, 2026Updated last week
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆42Oct 10, 2024Updated last year
- We want to create a Repo which can provide different Malwares wrote by Python.☆27May 26, 2025Updated 8 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 7 months ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Jan 13, 2025Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,538Jul 28, 2024Updated last year
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated 2 weeks ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A preconfigured Velociraptor triage collector☆75Updated this week
- AIL project training materials☆39Jul 17, 2025Updated 7 months ago
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆32Oct 16, 2019Updated 6 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 9 months ago
- An open source platform to support analysts to organise their case and tasks☆124Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,924Jan 20, 2026Updated 3 weeks ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆260Feb 9, 2026Updated last week
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214May 23, 2020Updated 5 years ago
- Threat Simulation Indexes☆39Jan 9, 2026Updated last month
- ☆74Apr 3, 2025Updated 10 months ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Playbooks for SOC Analysts☆674Dec 11, 2022Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆412Nov 8, 2025Updated 3 months ago