mildlytested / Wild-West---SOC-Core-Skills---NotesLinks
links collected from SOC Core Skills class
☆85Updated 4 years ago
Alternatives and similar repositories for Wild-West---SOC-Core-Skills---Notes
Users that are interested in Wild-West---SOC-Core-Skills---Notes are comparing it to the libraries listed below
Sorting:
- Quick SOC L1 ticket structure☆39Updated 6 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated last year
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- Indexes for SANS Courses and GIAC Certifications☆266Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆75Updated 5 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- Tools for simulating threats☆196Updated 2 years ago
- Blue Team Cheat Sheats☆166Updated 9 years ago
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆61Updated 4 years ago
- Atomic Purple Team Framework and Lifecycle☆298Updated 4 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆44Updated 5 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆57Updated 6 years ago
- Zeek Log Cheatsheets☆297Updated 3 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆82Updated 3 years ago
- Cybersecurity Incident Response Plan☆108Updated 5 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- ☆78Updated 4 years ago
- ☆63Updated 4 years ago
- Useful resources about phishing email analysis☆87Updated 9 months ago
- Some Threat Hunting queries useful for blue teamers☆130Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Updated 3 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- IoT Digital Forensics Course with hands-on labs☆231Updated 2 months ago
- ☆20Updated 6 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆186Updated 2 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago