☆20Aug 4, 2019Updated 6 years ago
Alternatives and similar repositories for SOC
Users that are interested in SOC are comparing it to the libraries listed below
Sorting:
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated last month
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆56Nov 25, 2020Updated 5 years ago
- Comprehensive notes and resources to ace the eLearnSecurity Junior Penetration Testing certificate, helping you master the art of ethical…☆13Nov 27, 2023Updated 2 years ago
- ☆12Nov 13, 2023Updated 2 years ago
- ☆10Jul 8, 2024Updated last year
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated last week
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 7 months ago
- ☆49Jan 14, 2025Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆12Feb 8, 2023Updated 3 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- ☆23Jun 28, 2025Updated 8 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆42May 20, 2021Updated 4 years ago
- ☆41Dec 19, 2021Updated 4 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Web server and API to scan any websites to detect malicious JS☆19Jul 26, 2022Updated 3 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 7 months ago
- Sysmon Splunk App☆47Aug 21, 2018Updated 7 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- ☆13Jun 14, 2024Updated last year
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago