Playbooks for SOC Analysts
☆694Dec 11, 2022Updated 3 years ago
Alternatives and similar repositories for Playbooks
Users that are interested in Playbooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,679Updated this week
- PowerShell tools to help defenders hunt smarter, hunt harder.☆478Oct 29, 2025Updated 5 months ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,264Mar 11, 2026Updated 2 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Sep 26, 2024Updated last year
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Useful resources for SOC Analyst and SOC Analyst candidates.☆906Aug 28, 2023Updated 2 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,297Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,332Mar 18, 2026Updated last week
- IRIS Module for Wazuh-Indexer Searching☆11Nov 24, 2023Updated 2 years ago
- PowerShell Digital Forensics & Incident Response Scripts.☆777Jan 14, 2026Updated 2 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆583Dec 6, 2025Updated 3 months ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆762Aug 28, 2025Updated 7 months ago
- A curated list of cybersecurity tools and resources.☆2,095Mar 2, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,671Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,548Jul 28, 2024Updated last year
- ☆195Mar 11, 2024Updated 2 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,088Mar 21, 2026Updated last week
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆454Feb 18, 2026Updated last month
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,064Oct 5, 2023Updated 2 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆791Updated this week
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- IRIS Module to Run Any Velociraptor Artifact☆15Mar 31, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Practical Windows Forensics Training☆755Feb 16, 2026Updated last month
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- Open source templates you can use to bootstrap your security programs☆897Dec 28, 2025Updated 3 months ago
- SOCFortress CoPilot☆452Updated this week
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆322Oct 12, 2025Updated 5 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Dec 29, 2023Updated 2 years ago
- Incident Response Methodologies 2022☆1,109Apr 11, 2025Updated 11 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,934Jan 20, 2026Updated 2 months ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆983Aug 26, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆250Jun 3, 2024Updated last year
- Digging Deeper....☆3,855Updated this week
- A curated list of tools for incident response☆8,901Jul 18, 2024Updated last year
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆261Feb 8, 2026Updated last month
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 3 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,738Updated this week
- A repository to share publicly available Velociraptor detection content☆198Updated this week