Advanced threat detection solution for Linux.
☆36Dec 5, 2020Updated 5 years ago
Alternatives and similar repositories for Kanis
Users that are interested in Kanis are comparing it to the libraries listed below
Sorting:
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Bash script that deploys virtual proxies which route traffic through OpenVPN and Tor tunnels.☆10Jul 29, 2019Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Go bindings for YARA☆14Aug 24, 2025Updated 6 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- ☆17Jan 22, 2026Updated last month
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- Hooking calls to libssl (openssl) to decrypt ssl traffic☆19Nov 16, 2020Updated 5 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- ☆35Jun 22, 2021Updated 4 years ago
- ☆58Mar 4, 2022Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- ☆29Sep 15, 2025Updated 5 months ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- ☆30Jan 13, 2026Updated last month
- Detect burp☆33Jun 7, 2021Updated 4 years ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago