A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers threat detection, log analysis, incident response, and cloud-based SOC setup to bridge academic theory with practical cybersecurity skills.
☆42Jun 10, 2025Updated 10 months ago
Alternatives and similar repositories for 30-Day-SOC-Analyst-Challenge
Users that are interested in 30-Day-SOC-Analyst-Challenge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated 2 months ago
- ☆18Dec 31, 2025Updated 4 months ago
- ☆14Dec 24, 2024Updated last year
- Pipeline that allows sending forensic artifacts to OpenRelik for automatic processing☆44Jan 30, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆70Apr 16, 2026Updated 3 weeks ago
- A list of AI leaders and communities you can follow☆26Jun 18, 2025Updated 10 months ago
- The Azure Hyper-V Lab makes virtualization on Azure effortless, perfect for experimenting, learning, and building proof-of-concepts.☆15May 17, 2025Updated 11 months ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- Repository for the paper "BONE: a unifying framework for Bayesian online learning in non-stationary environments"☆23Apr 9, 2026Updated last month
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆48Apr 30, 2026Updated last week
- A comprehensive TAK Server management solution providing a modern web interface for managing and monitoring TAK (Team Awareness Kit) serv…☆21Apr 2, 2025Updated last year
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 11 months ago
- ☆10Sep 11, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 9 months ago
- ☆34Feb 3, 2026Updated 3 months ago
- A Claude Code repository for GTM teams. Context templates, skills, workflows, and a fully built-out example — fork it, fill in your conte…☆117Apr 3, 2026Updated last month
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆32Apr 10, 2024Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆50Sep 26, 2025Updated 7 months ago
- ☆28Oct 15, 2025Updated 6 months ago
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆33Oct 24, 2023Updated 2 years ago
- A preconfigured Velociraptor triage collector☆76Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some of the tools we use during vCISO engagements☆18Apr 23, 2022Updated 4 years ago
- Quick SOC L1 ticket structure☆40Jun 20, 2019Updated 6 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆53Jan 28, 2026Updated 3 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 10 months ago
- A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama a…☆29Mar 8, 2026Updated 2 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 10 months ago
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆18Dec 29, 2024Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 6 months ago