zdhenard42 / SOC-MultitoolLinks
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
☆406Updated 5 months ago
Alternatives and similar repositories for SOC-Multitool
Users that are interested in SOC-Multitool are comparing it to the libraries listed below
Sorting:
- CLI tools for forensic investigation of Windows artifacts☆345Updated 3 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆714Updated 8 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆276Updated 2 years ago
- ☆185Updated last year
- Map tracking ransomware, by OCD World Watch team☆474Updated 7 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆255Updated last week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆267Updated 7 months ago
- A curated list of Awesome Threat Intelligence Blogs☆455Updated 2 weeks ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 10 months ago
- Tools for simulating threats☆193Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆608Updated 2 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- MISP Playbooks☆215Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆714Updated 2 months ago
- Practical Windows Forensics Training☆694Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆263Updated last month
- Open Source Security Operations Center Documentation☆197Updated 3 months ago
- ☆52Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- A list of Splunk queries that I've collected and used over time.☆86Updated 4 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆198Updated last year
- Awesome Incident Response☆282Updated 3 weeks ago
- Cyber Incident Response Team Playbook Battle Cards☆418Updated last year
- Playbooks for SOC Analysts☆610Updated 2 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆414Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆264Updated 4 months ago
- A curated list of Awesome Threat Intelligence blogs☆84Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated last week
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆252Updated this week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year