mthcht / awesome-listsLinks
Awesome Security lists for SOC/CERT/CTI
☆1,239Updated this week
Alternatives and similar repositories for awesome-lists
Users that are interested in awesome-lists are comparing it to the libraries listed below
Sorting:
- A resource containing all the tools each ransomware gangs uses☆1,322Updated last month
- Playbooks for SOC Analysts☆670Updated 3 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆631Updated 6 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆745Updated last year
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆764Updated 3 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,621Updated last week
- Practical Windows Forensics Training☆714Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆724Updated 6 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆761Updated 3 weeks ago
- Map tracking ransomware, by OCD World Watch team☆483Updated 2 weeks ago
- Yet another Ransomware gang tracker☆558Updated this week
- Incident Response Methodologies 2022☆1,101Updated 9 months ago
- Live Feed of C2 servers, tools, and botnets☆743Updated last week
- A curated list of Awesome Threat Intelligence Blogs☆489Updated 3 weeks ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,921Updated 3 weeks ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,206Updated last week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,207Updated last month
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,126Updated last month
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,207Updated last week
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆703Updated 9 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆445Updated this week
- Useful resources for SOC Analyst and SOC Analyst candidates.☆878Updated 2 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆415Updated 8 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆409Updated 2 years ago
- A curated list of annual cyber security reports☆983Updated this week
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆458Updated last year
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆960Updated 2 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,235Updated last week
- SIEM Tactics, Techiques, and Procedures☆694Updated last week