Awesome Security lists for SOC/CERT/CTI
☆1,462May 22, 2026Updated this week
Alternatives and similar repositories for awesome-lists
Users that are interested in awesome-lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆467Feb 18, 2026Updated 3 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆203Dec 20, 2024Updated last year
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,694May 10, 2026Updated last week
- yara detection rules for hunting with the threathunting-keywords project☆162May 11, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆814Jan 14, 2026Updated 4 months ago
- A resource containing all the tools each ransomware gangs uses☆1,367May 11, 2026Updated last week
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,731Updated this week
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆282Dec 20, 2025Updated 5 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,951May 14, 2026Updated last week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆835Updated this week
- Hunting queries and detections☆907May 7, 2026Updated 2 weeks ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆715May 2, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆769Updated this week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆621May 8, 2026Updated 2 weeks ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,169Updated this week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,598Jan 5, 2026Updated 4 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆785Jan 14, 2026Updated 4 months ago
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆889Updated this week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆652Jun 19, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆722Apr 25, 2026Updated 3 weeks ago
- Harness the power of Splunk for your investigations☆164Oct 11, 2025Updated 7 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆812May 15, 2026Updated last week
- PowerShell tools to help defenders hunt smarter, hunt harder.☆483Oct 29, 2025Updated 6 months ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆653May 11, 2026Updated last week
- CLI tools for forensic investigation of Windows artifacts☆351Jul 21, 2025Updated 10 months ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,195Apr 30, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Windows Events Attack Samples☆2,560Jan 24, 2023Updated 3 years ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆164Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,548May 9, 2026Updated 2 weeks ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆629May 9, 2026Updated last week
- Live Feed of C2 servers, tools, and botnets☆775Apr 13, 2026Updated last month
- A repository to share publicly available Velociraptor detection content☆203May 10, 2026Updated last week
- You didn't think I'd go and leave the blue team out, right?☆1,747Apr 14, 2026Updated last month