awesome-lists icon indicating copy to clipboard operation
awesome-lists copied to clipboard

Awesome Security lists for SOC/CERT/CTI

Security lists for SOC detections

dt

Threat Hunting:

ThreatHunting searches

Detection Lists

  • ๐Ÿ“‹ Lists: https://github.com/mthcht/awesome-lists/tree/main/Lists
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ ThreatHunting Guides: https://mthcht.medium.com/list/threat-hunting-708624e9266f
  • ๐Ÿ“š Hijacklibs: https://github.com/mthcht/awesome-lists/tree/main/Hijacklibs
  • ๐Ÿšฐ Suspicious Named pipes: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_named_pipe_list.csv
  • ๐Ÿ”ง Suspicious Windows Services: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_windows_services_names_list.csv
  • โฒ๏ธ Suspicious Windows Tasks: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_windows_tasks_list.csv
  • ๐Ÿšช Suspicious destination port: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_ports_list.csv
  • ๐Ÿ›ก๏ธ Suspicious Firewall rules: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_windows_firewall_rules_list.csv
  • ๐Ÿ†” Suspicious User-agent: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_http_user_agents_list.csv
  • ๐Ÿ“‡ Suspicious USB Ids: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_usb_ids_list.csv
  • ๐Ÿ”ข Suspicious MAC address: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_mac_address_list.csv
  • ๐Ÿ“› Suspicious Hostname: https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_hostnames_list.csv
  • ๐Ÿงฎ Metadata Executables: https://github.com/mthcht/awesome-lists/blob/main/Lists/executables_metadata_informations_list.csv
  • ๐Ÿ•ธ๏ธ DNS over HTTPS server list: https://github.com/mthcht/awesome-lists/blob/main/Lists/dns_over_https_servers_list.csv
  • ๐ŸŒ TOR Nodes List: https://github.com/mthcht/awesome-lists/tree/main/Lists/TOR
  • ๐Ÿ› ๏ธ LOLDriver List: https://github.com/mthcht/awesome-lists/blob/main/Lists/loldrivers_list.csv

SIEM/SOC related:

Investigation

TI

More TI

Sandbox

Data manipulation

Detection Resources

DFIR

Security News

Formations

DFIR

Others