ThreatHunter-Playbook
Infosec_Reference
ThreatHunter-Playbook | Infosec_Reference | |
---|---|---|
4 | 9 | |
3,873 | 5,365 | |
1.8% | - | |
0.0 | 4.2 | |
3 months ago | 15 days ago | |
Python | CSS | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThreatHunter-Playbook
- Threat hunting Playbooks
-
SOC Analyst Training
How fast is Jupyter in comparison? I’ve never seen it used for hunting, but apparently it’s pretty big and supported for it: https://github.com/OTRF/ThreatHunter-Playbook
- Jupyter Notebooks?
-
Cybersecurity Repositories
ThreatHunter-Playbook
Infosec_Reference
- How to improve documentation / technical writing skills?
- Manuals
-
Cybersecurity Repositories
Infosec Reference
- About Russia's Industrial Control System Attacks...
- Advise please?
- I'm preparing for the interview and I've curated a list of resources that might be helpful for you also.
-
Noob questions and advice
There’s this: https://github.com/rmusser01/Infosec_Reference
-
How to grt better/ homelab help
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Building_A_Lab.md Has some ideas. The first things to decide on would be what do you want to use for your hosting environment. Do you want to run ESXi? HyperV? Xen? Something else? What do you want to learn? What sort of environments do you want to simulate?
- Cybersec Bootcamp
What are some alternatives?
MonsterHunterPortable3rdHDRemake - Personal fork of a texture upscaling project for PSP's Monster Hunter Portable 3rd
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
HELK - The Hunting ELK
hackdroid - Security Apps for Android
whids - Open Source EDR for Windows
red_team_attack_lab - Red Team Attack Lab for TTP testing & research
APTnotes - Various public documents, whitepapers and articles about APT campaigns
the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
awesome-appsec - A curated list of resources for learning about application security
AlanFramework - A C2 post-exploitation framework
awesome-incident-response - A curated list of tools for incident response
bugbounty-cheatsheet - A list of interesting payloads, tips and tricks for bug bounty hunters.