santosomar / awesome-threat-intelligenceLinks
A curated list of Awesome Threat Intelligence resources
☆32Updated 7 years ago
Alternatives and similar repositories for awesome-threat-intelligence
Users that are interested in awesome-threat-intelligence are comparing it to the libraries listed below
Sorting:
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- A collaborative CISSP notes card☆40Updated 9 years ago
- Kill Chain Matrix -->>☆38Updated 6 years ago
- ☆54Updated 4 years ago
- Incident Response Playbooks☆14Updated 6 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆70Updated 5 years ago
- Web application to create indexes for GIAC certification examinations.☆143Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- an awesome list of active defense resources☆122Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- ☆131Updated last year
- Presentation Slides and Video links☆32Updated 3 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆183Updated last month
- A list of collected articles and resources from the website Peerlyst☆17Updated 8 years ago
- ☆49Updated 4 years ago
- Tools to automate and/or expedite response.☆115Updated 11 months ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Gather Open-Source Intelligence using PowerShell.☆175Updated 5 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".☆20Updated 7 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago