A curated list of FOSS software appliances for building a SOC
☆18Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for awesome-SOC-appliances
Users that are interested in awesome-SOC-appliances are comparing it to the libraries listed below
Sorting:
- ☆20Aug 4, 2019Updated 6 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- Security Operation Center Lab☆20Oct 8, 2024Updated last year
- ☆12Feb 8, 2021Updated 5 years ago
- Cheatsheet collection of Infosec tools☆15May 18, 2019Updated 6 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 8 months ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- ☆35Updated this week
- ☆39Sep 10, 2025Updated 6 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Carbon Black integration Python utility library☆12Oct 29, 2020Updated 5 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- A curated list of awesome curated lists of many topics.☆12Jan 29, 2020Updated 6 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- A simple interface for accessing items in your Bitwarden Vault☆13Dec 11, 2020Updated 5 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.☆10Dec 18, 2020Updated 5 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- ☆19Nov 23, 2022Updated 3 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- MAES: M365 Analyzer & Extractor Suite Po☆33Feb 14, 2026Updated last month
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- Source code for Django Testing Tutorial☆11Jul 17, 2022Updated 3 years ago
- ☆49Jan 14, 2025Updated last year
- Detailed OSINT guide for future engagements.☆17Jan 15, 2023Updated 3 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- Queries a McAfee ESM for inactive data sources.☆10Dec 16, 2019Updated 6 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆533Jan 13, 2026Updated 2 months ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 7 years ago
- Push-button Security Operations Center using Kubernetes☆13Oct 19, 2016Updated 9 years ago
- AIShub collector gets data from AIShub network and stores it to the MySQL database for later use.☆12Feb 23, 2018Updated 8 years ago
- ☆21Jun 23, 2018Updated 7 years ago