An introduction to detection engineering
☆14Jan 3, 2025Updated last year
Alternatives and similar repositories for Detection-Engineering-Intro
Users that are interested in Detection-Engineering-Intro are comparing it to the libraries listed below
Sorting:
- Everything related to YARA☆16Feb 19, 2026Updated last month
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- ☆34Nov 11, 2025Updated 4 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Apr 20, 2025Updated 11 months ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Mar 15, 2026Updated last week
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- ☆17Sep 4, 2022Updated 3 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Sep 4, 2022Updated 3 years ago
- ☆11Dec 7, 2025Updated 3 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Golang C2 Client + PHP API Handler☆13Aug 1, 2023Updated 2 years ago
- Get Windows Process List in Rust☆10May 4, 2022Updated 3 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 3 months ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- Hunt for SQLite files used by various applications☆30Mar 1, 2026Updated 3 weeks ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- ☆11Apr 10, 2021Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆58Jan 8, 2024Updated 2 years ago
- ☆253Jun 7, 2025Updated 9 months ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Node module to generate likely aliases for a given human name☆22Aug 4, 2023Updated 2 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago