zdhenard42 / SOC-MultitoolLinks
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
☆410Updated 6 months ago
Alternatives and similar repositories for SOC-Multitool
Users that are interested in SOC-Multitool are comparing it to the libraries listed below
Sorting:
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆724Updated 10 months ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 4 months ago
- ☆188Updated last year
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆280Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆271Updated 8 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆403Updated last year
- MISP Playbooks☆219Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated 3 weeks ago
- Map tracking ransomware, by OCD World Watch team☆479Updated 8 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 11 months ago
- Tools for simulating threats☆197Updated 2 years ago
- A curated list of Awesome Threat Intelligence Blogs☆471Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆717Updated 3 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆269Updated 2 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆618Updated 4 months ago
- Awesome Incident Response☆283Updated 2 months ago
- Practical Windows Forensics Training☆701Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago
- ☆63Updated 4 years ago
- Cyber Incident Response Team Playbook Battle Cards☆423Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆422Updated last week
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆415Updated 3 months ago
- ☆53Updated 2 years ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆254Updated this week
- Playbooks for SOC Analysts☆633Updated 2 years ago
- Open Source Security Operations Center Documentation☆202Updated 5 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆203Updated last week
- A curated list of Awesome Threat Intelligence blogs☆86Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year