Curated list for SOC/DFIR/CTI
Top 36.5% on sourcepulse
This repository serves as a curated collection of security-focused lists, primarily aimed at Security Operations Center (SOC) analysts, Digital Forensics and Incident Response (DFIR) professionals, and Cyber Threat Intelligence (CTI) practitioners. It provides a centralized resource for Indicators of Compromise (IOCs), detection rules, threat hunting queries, and tools relevant to cybersecurity defense and investigation.
How It Works
The project aggregates and organizes a vast array of security-related data points, including suspicious file names, user agents, domain names, IP addresses, malware signatures, and attack techniques. These lists are often updated automatically or regularly, drawing from various sources and analyses of malware and threat actor activities. The goal is to provide actionable intelligence for detecting and responding to cyber threats.
Quick Start & Requirements
This repository is a collection of links and data, not a software package. Accessing the content requires a web browser. Specific tools or scripts mentioned within the lists may have their own installation and dependency requirements, typically involving Python, specific libraries, or SIEM platforms like Splunk or Elastic.
Highlighted Details
Maintenance & Community
The repository is actively maintained by the author, mthcht, with contributions and references to many other security researchers and organizations. Links to Discord and Slack communities are provided for various security disciplines.
Licensing & Compatibility
The repository itself is primarily a collection of links and data, with the underlying code and data likely subject to the licenses of their original sources. Users should verify the licensing of any specific tools or datasets they choose to utilize.
Limitations & Caveats
As a curated list, the accuracy and recency of the information depend on the original sources. Users should independently validate IOCs and detection logic before operational deployment. The sheer volume of information may require significant effort to filter and integrate into specific security workflows.
19 hours ago
1 day