mthcht / awesome-lists
Awesome Security lists for SOC/CERT/CTI
☆908Updated this week
Alternatives and similar repositories for awesome-lists:
Users that are interested in awesome-lists are comparing it to the libraries listed below
- Awesome list of keywords and artifacts for Threat Hunting sessions☆554Updated last month
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆655Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆997Updated 2 weeks ago
- Playbooks for SOC Analysts☆434Updated 2 years ago
- Practical Windows Forensics Training☆651Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆640Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,355Updated last month
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆658Updated 5 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆333Updated 7 months ago
- Map tracking ransomware, by OCD World Watch team☆463Updated 3 weeks ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆471Updated 2 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆610Updated 9 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆396Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆645Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆383Updated last month
- A curated list of awesome Memory Forensics for DFIR☆413Updated last month
- Yet another Ransomware gang tracker☆402Updated last week
- CLI tools for forensic investigation of Windows artifacts☆328Updated 5 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆559Updated 2 months ago
- Live Feed of C2 servers, tools, and botnets☆607Updated last week
- Purple Team Exercise Framework☆687Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆951Updated 2 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆276Updated last week
- Incident Response Methodologies 2022☆1,041Updated last year
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆591Updated 3 weeks ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 9 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,783Updated last week
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆390Updated 3 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆717Updated 2 weeks ago
- PowerShell Digital Forensics & Incident Response Scripts.☆589Updated this week