A python package for use in generating fake data for SOC and security automation.
☆175Mar 7, 2025Updated last year
Alternatives and similar repositories for soc-faker
Users that are interested in soc-faker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- EventList☆377Mar 21, 2021Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Jan 14, 2022Updated 4 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- ☆14Mar 5, 2021Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- A Python package to interact with the Mitre ATT&CK Framework☆478Oct 10, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115May 18, 2020Updated 5 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆301Updated this week
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- Purple Team Security☆76Mar 24, 2022Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- Defences against Cobalt Strike☆1,298Jul 14, 2022Updated 3 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,460Updated this week
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Jul 26, 2023Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,221Mar 18, 2026Updated last week
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago