Pinned Loading
-
soc-automation-lab
soc-automation-lab PublicDocumented SOC automation workflow using Wazuh, N8N, Caldera, and Velociraptor
-
Detection-Rules
Detection-Rules PublicThis repository contains validated detection rules for adversary behaviors observed during APT29 simulation. Each rule was tested against the actual attack data, converted to Splunk SPL, and valida…
-
Yara-Threat-Hunting
Yara-Threat-Hunting Public🛡️ Practical YARA rule writing and threat hunting exercises — scanning files, tuning rules, and detecting malware-like patterns using real-world techniques. Ideal for blue teamers starting out with…
-
ELK-SOC-lab-setup
ELK-SOC-lab-setup PublicA practical and brutally honest guide to setting up an ELK stack for a SOC lab. Includes real-world issues, missteps, and how everything finally came together. Built by Manish Rawat as part of his …
-
If the problem persists, check the GitHub status page or contact support.