shahnitav / HomeLab-SetupLinks
HomeLab Setup with a Firewall, SIEM Solution, Exploitable machines and Attacker.
☆31Updated 3 years ago
Alternatives and similar repositories for HomeLab-Setup
Users that are interested in HomeLab-Setup are comparing it to the libraries listed below
Sorting:
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆94Updated last year
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆119Updated 11 months ago
- List of resources for buiding a home lab☆299Updated 2 years ago
- A list of Splunk queries that I've collected and used over time.☆90Updated 5 years ago
- ☆192Updated last year
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- SIEM Cheat Sheet☆80Updated 2 years ago
- A collection of sources of documentation and best practices to build and run a SOC☆68Updated 3 years ago
- ☆60Updated 7 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆141Updated 2 months ago
- Useful resources about phishing email analysis☆86Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Updated 2 months ago
- This is a public repository to help those trying to learn Azure content and certifications to better understand the concepts and have a c…☆32Updated 2 years ago
- ☆59Updated 3 months ago
- ☆40Updated 2 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆183Updated 3 weeks ago
- pcaps of traffic for traffic analysis workshop☆93Updated 4 years ago
- ☆66Updated 4 years ago
- SPL cheatsheet for Splunk.☆26Updated 3 years ago
- A curated repository of incident response playbooks☆113Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆56Updated 3 years ago
- ☆54Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆105Updated 3 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- This repository contains Splunk queries to hunt some anomalies☆46Updated 3 years ago
- ☆96Updated last month
- A curated list of Awesome Threat Intelligence blogs☆97Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Updated last year
- ☆47Updated 3 years ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆241Updated last year