Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
-
Updated
Mar 4, 2026 - TypeScript
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam prep and skill-building in blue team operations.
This project automates SOC workflows using Wazuh, Shuffle, and TheHive. It involves setting up a Windows 10 client with Sysmon and Ubuntu 22.04 for Wazuh and TheHive, deployed on cloud or VMs. Goals: automate event collection, alerting, and incident response to enhance SOC efficiency.
The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simplifies tracking of security readiness against ATT&CK® tactics and techniques, offering a customizable, user-friendly interface for SOC analysts.
Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion
Ultimate Cybersecurity Roadmap (2025 Edition) | Beginner to Advanced Guide | Learn Ethical Hacking, SOC Analysis, Threat Hunting, Incident Response, and More by Shaikh Minhaj (Cyber With Minhaj)
Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace
The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 months ago. These answers can be used by others who want to learn and practice their skills in cybersecurity.
A curated collection of essential resources, tools, and references for Security Operations Center (SOC) analysts.
The Security Maturity Project Tracking Matrix helps organizations evaluate and enhance their security capabilities across multiple domains. It provides a structured framework to track progress, streamline processes, and achieve security maturity goals effectively.
PythonSOCModules: Elevate your Security Operations Center (SOC) with Python's Paramiko, Requests, PyShark, Scapy, Matplotlib, and Seaborn modules. Strengthen security monitoring, incident detection, and response.
A comprehensive SOC Analyst project that includes detection rules, attack simulations, automated responses, and SIEM configuration.
A log-based Threat Hunting tool
Yet another SoC Lab
A Security Operations Center (SOC) created by open source tools
A fully isolated, multi-VLAN Cybersecurity SOC Simulation Lab integrating pfSense firewall, Wazuh SIEM, Snort IDS/IPS, and target machines for realistic attack detection, log analysis, and threat simulation — designed to showcase professional detection engineering and network defense capabilities.
This repository hold a complete step by step documentation of the creation of a Security Operations Center SOC home lab.
Certified SOC Analyst (CSA) Program - A comprehensive 6-month, hands-on Security Operations Center training curriculum. Developed by Aminu Idris, AMCPN | International Cybersecurity and Digital Forensics Academy (ICDFA)
A set of Windows tools designed for SOC labs and controlled test environments providing automated TLS key logging setup for web encrypted traffic analysis and enabling or disabling of 16 Windows Defender components (9 functional protection components and 7 services/drivers) to support malware research, detection engineering, and Blue Team training.
A collection of sources of documentation, as well as field best practices, to build/run a SOC
Add a description, image, and links to the security-operations-center topic page so that developers can more easily learn about it.
To associate your repository with the security-operations-center topic, visit your repo's landing page and select "manage topics."