swimlane / soc-fakerView external linksLinks
A python package for use in generating fake data for SOC and security automation.
☆175Mar 7, 2025Updated 11 months ago
Alternatives and similar repositories for soc-faker
Users that are interested in soc-faker are comparing it to the libraries listed below
Sorting:
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Aug 30, 2022Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- ☆14May 30, 2018Updated 7 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- EventList☆376Mar 21, 2021Updated 4 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Detect Tactics, Techniques & Combat Threats☆2,262Jan 21, 2026Updated 3 weeks ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- Windows Events Attack Samples☆2,507Jan 24, 2023Updated 3 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- ☆38Jan 3, 2022Updated 4 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Feb 9, 2026Updated last week
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Automatically create YARA rules from malicious documents.☆212May 16, 2022Updated 3 years ago
- Purple Team Security☆76Mar 24, 2022Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,286Feb 27, 2023Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 5 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,173Jul 26, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated 11 months ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆184Oct 9, 2021Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 10 months ago
- AutoMacTC: Automated Mac Forensic Triage Collector☆553Mar 31, 2022Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Splunk code (SPL) for serious threat hunters and detection engineers.☆289Jan 15, 2024Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Swordphish Phishing Awareness Tool☆225Sep 22, 2024Updated last year