An introduction to detection engineering
☆14Jan 3, 2025Updated last year
Alternatives and similar repositories for Detection-Engineering-Intro
Users that are interested in Detection-Engineering-Intro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- External telegram feeder for AIL framework☆19Jan 21, 2026Updated 3 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆85Apr 20, 2025Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Apr 5, 2026Updated 3 weeks ago
- Work in Progress repo☆16Apr 18, 2019Updated 7 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- UnpacMe IDA Byte Search☆28Nov 20, 2023Updated 2 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Sep 4, 2022Updated 3 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python module to interact with THOR Thunderstorm service☆18Dec 5, 2025Updated 4 months ago
- Get Windows Process List in Rust☆10May 4, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 6 months ago
- Hunt for SQLite files used by various applications☆31Mar 1, 2026Updated 2 months ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Coordinates scrapers and interfaces with database☆20Aug 8, 2023Updated 2 years ago
- Golang C2 Client + PHP API Handler☆14Aug 1, 2023Updated 2 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆58Jan 8, 2024Updated 2 years ago
- Privacy Check Go☆25Feb 11, 2026Updated 2 months ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated 2 years ago
- ☆255Jun 7, 2025Updated 10 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Node module to generate likely aliases for a given human name☆22Aug 4, 2023Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 7 months ago
- ☆83Feb 4, 2026Updated 2 months ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago