moshekaplan / awesome-SOC-appliances
A curated list of FOSS software appliances for building a SOC
☆18Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-SOC-appliances
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Threat Hunter's Knowledge Base☆22Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆97Updated last year
- Cybersecurity Incident Response Plan☆87Updated 4 years ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- ☆43Updated last month
- ☆61Updated 3 years ago
- A list of resources to build a information security team.☆13Updated 3 years ago
- Security Operation Center Lab☆15Updated last month
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆19Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago
- Cheat sheets for threat hunting, detection and other stuff.☆32Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- ☆28Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆89Updated 9 months ago
- SIEM Cheat Sheet☆72Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago