mthcht / awesome-lists
Awesome Security lists for SOC/CERT/CTI
☆815Updated this week
Alternatives and similar repositories for awesome-lists:
Users that are interested in awesome-lists are comparing it to the libraries listed below
- Awesome list of keywords and artifacts for Threat Hunting sessions☆506Updated this week
- Playbooks for SOC Analysts☆400Updated 2 years ago
- A resource containing all the tools each ransomware gangs uses☆887Updated 3 weeks ago
- Practical Windows Forensics Training☆641Updated 11 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆619Updated this week
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆386Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆344Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,303Updated last week
- PowerShell Digital Forensics & Incident Response Scripts.☆556Updated 3 weeks ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆661Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆598Updated 7 months ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆633Updated this week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆634Updated 3 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆384Updated last month
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆460Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,748Updated this week
- Map tracking ransomware, by OCD World Watch team☆423Updated 4 months ago
- Documentation and scripts to properly enable Windows event logs.☆583Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆698Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆308Updated 5 months ago
- ☆512Updated 3 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆542Updated 2 weeks ago
- CLI tools for forensic investigation of Windows artifacts☆322Updated 2 months ago
- A curated list of Awesome Threat Intelligence Blogs☆357Updated last month
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆556Updated 4 months ago
- Incident Response Methodologies 2022☆1,020Updated 11 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆641Updated last year
- Live Feed of C2 servers, tools, and botnets☆560Updated this week
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,338Updated last week
- A curated list of awesome Memory Forensics for DFIR☆384Updated last year