riccardosl's Stars
public-apis/public-apis
A collective list of free APIs
Developer-Y/cs-video-courses
List of Computer Science courses with video lectures.
cloudcommunity/Free-Certifications
A curated list of free courses & certifications.
MISP/MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
fastfire/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
outflanknl/RedELK
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
rabobank-cdc/DeTTECT
Detect Tactics, Techniques & Combat Threats
Purp1eW0lf/Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
OTRF/Security-Datasets
Re-play Security Events
reprise99/Sentinel-Queries
Collection of KQL queries
splunk/security_content
Splunk Security Content
tadwhitaker/Security_Engineer_Interview_Questions
Every Security Engineer Interview Question From Glassdoor.com
curated-intel/Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
correlatedsecurity/Awesome-SOAR
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
threathunters-io/laurel
Transform Linux Audit logs for SIEM usage
curated-intel/CTI-fundamentals
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence
GossiTheDog/ThreatHunting
Tools for hunting for threats.
threat-hunting/awesome_Threat-Hunting
A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.
mitre-attack/attack-datasources
This content is analysis and research of the data sources currently listed in ATT&CK.
cyberark/BlobHunter
Find exposed data in Azure with this public blob scanner
vadim-hunter/Detection-Ideas-Rules
Detection Ideas & Rules repository.
BushidoUK/OSINT-SearchOperators
smithakolan/MachineLearningFundamentals
splunk/attack-detections-collector
Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique
tropChaud/Categorized-Adversary-TTPs
Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-technique pivoting.
d3sre/IntelligentProcessLifecycle
The Intelligent Process Lifecycle of Active Cyber Defenders
fastfire/IsraelPalestineConflict
List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.
sixgroup-security/Advisories
r00tMI/library
This is where r00tMi shares books that its members found interesting.