mthcht / awesome-listsLinks
Awesome Security lists for SOC/CERT/CTI
☆1,021Updated this week
Alternatives and similar repositories for awesome-lists
Users that are interested in awesome-lists are comparing it to the libraries listed below
Sorting:
- A resource containing all the tools each ransomware gangs uses☆1,066Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆585Updated last week
- Playbooks for SOC Analysts☆543Updated 2 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆696Updated 5 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆703Updated last month
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,449Updated 2 weeks ago
- Practical Windows Forensics Training☆670Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆702Updated last week
- Map tracking ransomware, by OCD World Watch team☆469Updated 4 months ago
- Yet another Ransomware gang tracker☆457Updated this week
- Incident Response Methodologies 2022☆1,063Updated 3 months ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆777Updated last year
- A curated list of annual cyber security reports☆568Updated this week
- Live Feed of C2 servers, tools, and botnets☆667Updated last week
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆480Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,163Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆364Updated 11 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆632Updated last week
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆673Updated 2 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆325Updated last week
- A curated list of Awesome Threat Intelligence Blogs☆430Updated 3 weeks ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,814Updated last month
- A curated list of awesome Memory Forensics for DFIR☆462Updated 4 months ago
- Documentation and scripts to properly enable Windows event logs.☆620Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆397Updated 2 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆399Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆620Updated last year
- CLI tools for forensic investigation of Windows artifacts☆344Updated 8 months ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,011Updated 2 weeks ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆802Updated last week