tguard-soc-package / nusantara
☆210Updated 11 months ago
Alternatives and similar repositories for nusantara:
Users that are interested in nusantara are comparing it to the libraries listed below
- ☆175Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆662Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated last month
- Playbooks for SOC Analysts☆501Updated 2 years ago
- SOCFortress CoPilot☆275Updated this week
- MISP Playbooks☆199Updated 2 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆52Updated last year
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- Open Source Security Operations Center Documentation☆178Updated this week
- ☆159Updated 7 months ago
- A production ready Dockered MISP☆229Updated this week
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide …☆98Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 6 months ago
- ☆34Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 10 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆256Updated last year
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆139Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆239Updated last week
- PowerShell tools to help defenders hunt smarter, hunt harder.☆364Updated 3 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆245Updated last month
- SIEM Cheat Sheet☆73Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated last year
- ☆312Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆159Updated 11 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆379Updated 3 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆672Updated 3 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆196Updated this week
- ☆12Updated 2 months ago