mrtouch93 / awesome-security-feed
A semi-curated list of Security Feeds
☆122Updated 2 years ago
Alternatives and similar repositories for awesome-security-feed:
Users that are interested in awesome-security-feed are comparing it to the libraries listed below
- Repository resource for threat hunter☆158Updated 6 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆143Updated last month
- ☆116Updated last year
- an awesome list of active defense resources☆116Updated 4 years ago
- Collection of created MindMaps☆150Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆199Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆125Updated 8 months ago
- Resources To Learn And Understand SIGMA Rules☆172Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆181Updated 2 years ago
- MISP Playbooks☆182Updated last month
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆52Updated 5 years ago
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- Detection Ideas & Rules repository.☆178Updated 3 years ago
- Open Threat Hunting Framework☆105Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆148Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated 6 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆154Updated 2 years ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆146Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆182Updated 2 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆111Updated last year
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- Pwnspoof repository☆257Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago