β¨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. π· π
β291Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for detection-and-response-pipeline
Users that are interested in detection-and-response-pipeline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation oβ¦β1,162Apr 1, 2026Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.β298May 5, 2024Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.β407Sep 2, 2023Updated 2 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securitβ¦β37Oct 17, 2024Updated last year
- β65May 21, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).β416Mar 26, 2026Updated 2 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirementsβ127Dec 5, 2023Updated 2 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.β395Jan 20, 2026Updated 2 months ago
- Anvilogic Forgeβ117Mar 31, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β341Apr 1, 2026Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation oβ¦β101Jan 12, 2024Updated 2 years ago
- A repository of my own Sigma detection rules.β164Nov 25, 2025Updated 4 months ago
- Built-in Panther detection rules and policiesβ442Apr 2, 2026Updated last week
- An AWS IAM policy statement parser and query tool.β199Feb 10, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).β808Jan 14, 2026Updated 2 months ago
- β¨ A curated list of awesome threat detection and hunting resources π΅οΈββοΈβ4,549Jan 5, 2026Updated 3 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.β120Updated this week
- A collection of companies that disclose adversary TTPs after they have been breachedβ289Mar 14, 2026Updated 3 weeks ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromiseβ69Apr 29, 2024Updated last year
- An opensource sigma conversion tool built using pysigmaβ163Mar 24, 2026Updated 2 weeks ago
- an awesome list of honeypot resourcesβ10Jul 14, 2017Updated 8 years ago
- Granular, Actionable Adversary Emulation for the Cloudβ2,289Apr 2, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )β223Sep 4, 2024Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ82Jul 25, 2022Updated 3 years ago
- β400Sep 25, 2023Updated 2 years ago
- PII detection platform, leveraging human-in-the-loop AIβ54Nov 29, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is deβ¦β819Mar 6, 2026Updated last month
- Generate datasets of cloud audit logs for common attacksβ236Updated this week
- Automating Security Detection Engineering, published by Packtβ67Oct 12, 2024Updated last year
- A framework for developing alerting and detection strategies for incident response.β856Sep 8, 2025Updated 7 months ago
- β2,546Updated this week
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWSβ1,665Jan 8, 2025Updated last year
- β10Sep 12, 2024Updated last year
- Crowdsourced list of sensitive IAM Actionsβ159Oct 29, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.β1,942Mar 26, 2026Updated 2 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.β60Mar 12, 2022Updated 4 years ago
- Detect Tactics, Techniques & Combat Threatsβ2,275Jan 21, 2026Updated 2 months ago
- β99Sep 16, 2022Updated 3 years ago