☆120May 26, 2025Updated 10 months ago
Alternatives and similar repositories for DetectIQ
Users that are interested in DetectIQ are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆92Nov 3, 2025Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- An opensource sigma conversion tool built using pysigma☆163Mar 24, 2026Updated 2 weeks ago
- Living off the False Positive!☆42Apr 3, 2026Updated last week
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- A fun POC that is built to understand AI security agents.☆34Oct 30, 2025Updated 5 months ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆17Sep 5, 2024Updated last year
- A home for detection content developed by the delivr.to team☆72Aug 10, 2025Updated 7 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆158May 11, 2025Updated 10 months ago
- ☆14Sep 22, 2023Updated 2 years ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated last week
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A curated list of AI driven Cyber security Resources☆48Mar 28, 2026Updated last week
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- ☆27Feb 3, 2026Updated 2 months ago
- ☆34Aug 8, 2023Updated 2 years ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆214Mar 4, 2026Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,212Dec 29, 2025Updated 3 months ago
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated 2 months ago
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Turn any blog into structured threat intelligence.☆54Apr 2, 2026Updated last week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆306Mar 19, 2026Updated 3 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆324Oct 12, 2025Updated 5 months ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last week
- Find potential DLL Sideloads on your windows computer☆221Jan 12, 2025Updated last year
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- ☆65Mar 31, 2026Updated last week
- ☆34May 24, 2023Updated 2 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆53Mar 10, 2026Updated 3 weeks ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Apr 20, 2025Updated 11 months ago