Admyral-Security / admyral
π€ Admyral's Python SDK simplifies writing workflow automations for Security Engineers
β259Updated this week
Related projects: β
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contrβ¦β160Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β145Updated last week
- Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident reβ¦β326Updated last month
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with β¦β112Updated 2 months ago
- A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.β312Updated 2 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )β107Updated 2 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of parβ¦β248Updated 11 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Geminiβ143Updated 6 months ago
- Galah: An LLM-powered web honeypot.β382Updated last week
- β234Updated 3 months ago
- Rules generated from our investigations.β186Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.β270Updated 4 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch β¦β159Updated 3 months ago
- A production ready Dockered MISPβ138Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.β235Updated this week
- β¨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The β¦β246Updated 7 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multipleβ¦β546Updated 2 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the resultsβ248Updated last week
- The Sigma command line interface based on pySigmaβ130Updated last month
- LOKI2 - Simple IOC and YARA Scannerβ77Updated last month
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlβ¦β95Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CKβ¦β159Updated last month
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)β382Updated this week
- Gram is Klarna's own threat model diagramming toolβ267Updated last week
- Automation tool for Windows Deception Host Burn-Inβ71Updated 2 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tacticsβ159Updated 2 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breachedβ236Updated 4 months ago
- β344Updated 5 months ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).β323Updated last week
- HASH (HTTP Agnostic Software Honeypot)β128Updated 4 months ago