0xN3utr0n / KanisView external linksLinks
Advanced threat detection solution for Linux.
☆36Dec 5, 2020Updated 5 years ago
Alternatives and similar repositories for Kanis
Users that are interested in Kanis are comparing it to the libraries listed below
Sorting:
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Go bindings for YARA☆14Aug 24, 2025Updated 5 months ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- ☆17Jan 22, 2026Updated 3 weeks ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 8 months ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 6 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- ☆58Mar 4, 2022Updated 3 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Apr 29, 2024Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- FE-511 Bloomberg Terminal and Thomson Reuters☆11Feb 8, 2017Updated 9 years ago
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago