mildlytested / Wild-West---SOC-Core-Skills---NotesLinks
links collected from SOC Core Skills class
☆85Updated 4 years ago
Alternatives and similar repositories for Wild-West---SOC-Core-Skills---Notes
Users that are interested in Wild-West---SOC-Core-Skills---Notes are comparing it to the libraries listed below
Sorting:
- Indexes for SANS Courses and GIAC Certifications☆262Updated last year
- Quick SOC L1 ticket structure☆39Updated 6 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆72Updated 5 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆40Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated last year
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆59Updated 4 years ago
- Blue Team Cheat Sheats☆166Updated 9 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆56Updated 6 years ago
- Tools for simulating threats☆193Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆81Updated 3 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- A template for writing a condensed course index leveraging LaTeX indexing☆114Updated 4 months ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆44Updated 5 years ago
- The latest pyWars client for the SEC573 class☆47Updated 7 months ago
- an awesome list of active defense resources☆126Updated 5 years ago
- IoT Digital Forensics Course with hands-on labs☆231Updated last month
- Atomic Purple Team Framework and Lifecycle☆298Updated 4 years ago
- Cybersecurity Incident Response Plan☆108Updated 5 years ago
- ☆77Updated 4 years ago
- Some Threat Hunting queries useful for blue teamers☆129Updated 3 years ago
- A cybersecurity game in Azure Data Explorer☆173Updated last year
- Useful resources about phishing email analysis☆87Updated 8 months ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- A list of my personal projects☆177Updated 3 years ago
- Zeek Log Cheatsheets☆297Updated 2 months ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated last week
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago