mthcht / awesome-listsLinks
Awesome Security lists for SOC/CERT/CTI
☆984Updated this week
Alternatives and similar repositories for awesome-lists
Users that are interested in awesome-lists are comparing it to the libraries listed below
Sorting:
- A resource containing all the tools each ransomware gangs uses☆1,041Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆681Updated 4 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆575Updated last month
- Playbooks for SOC Analysts☆516Updated 2 years ago
- Practical Windows Forensics Training☆665Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,399Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆675Updated this week
- Useful resources for SOC Analyst and SOC Analyst candidates.☆757Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,802Updated last month
- Documentation and scripts to properly enable Windows event logs.☆613Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆746Updated 2 weeks ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆394Updated 3 weeks ago
- Incident Response Methodologies 2022☆1,052Updated last month
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆615Updated 11 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆683Updated 2 weeks ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆658Updated last month
- Yet another Ransomware gang tracker☆441Updated last week
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆354Updated 9 months ago
- Live Feed of C2 servers, tools, and botnets☆648Updated last week
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆477Updated last month
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆906Updated last year
- Map tracking ransomware, by OCD World Watch team☆468Updated 2 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆652Updated last year
- PowerShell Digital Forensics & Incident Response Scripts.☆602Updated 2 months ago
- A curated list of Awesome Threat Intelligence Blogs☆406Updated this week
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆694Updated 2 weeks ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆980Updated last month
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆310Updated this week
- CLI tools for forensic investigation of Windows artifacts☆339Updated 7 months ago