A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
☆118Jan 6, 2023Updated 3 years ago
Alternatives and similar repositories for cybersecurity-SOAR
Users that are interested in cybersecurity-SOAR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like P…☆32Oct 3, 2025Updated 5 months ago
- an IOS tweaks app using only SwiftUI☆14Feb 4, 2023Updated 3 years ago
- GeoSn0w's majestic knowledge base for iOS 12 / iOS 13 Jailbreak Development.☆94Oct 28, 2023Updated 2 years ago
- This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!☆120Jan 14, 2026Updated 2 months ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆62Jan 6, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 3 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆20Feb 29, 2024Updated 2 years ago
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆92Mar 2, 2021Updated 5 years ago
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Nov 11, 2022Updated 3 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines and technical resou…☆14Apr 9, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆90Oct 9, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆68Jul 25, 2025Updated 8 months ago
- SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive…☆678Sep 20, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆99Jan 20, 2023Updated 3 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆50Dec 19, 2022Updated 3 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆171Jun 19, 2024Updated last year
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆26Jan 30, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆65Aug 30, 2022Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about macOS Securi…☆65Jan 23, 2022Updated 4 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆227Jan 27, 2025Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Jan 6, 2024Updated 2 years ago
- 🧠 Using large language models to classify dark net documents in a zero-shot learning enviornments.☆21Apr 1, 2022Updated 3 years ago
- A collection of digital forensics tools for verification, investigations, diagnostics, software, libraries, learning tutorials, framework…☆33Aug 26, 2022Updated 3 years ago
- A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science stu…☆19Mar 6, 2022Updated 4 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Jun 14, 2023Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Interview fo…☆67Mar 7, 2022Updated 4 years ago
- Gathers metrics of your choice for the entire history of a macOS Messages conversation☆33Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆35Apr 9, 2022Updated 3 years ago