An introduction to detection engineering
☆14Jan 3, 2025Updated last year
Alternatives and similar repositories for Detection-Engineering-Intro
Users that are interested in Detection-Engineering-Intro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Everything related to YARA☆16Apr 18, 2026Updated last month
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated last year
- External telegram feeder for AIL framework☆19Jan 21, 2026Updated 4 months ago
- ☆34Apr 29, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆85Apr 20, 2025Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70May 14, 2026Updated last week
- Work in Progress repo☆16Apr 18, 2019Updated 7 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Sep 4, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Python module to interact with THOR Thunderstorm service☆18Dec 5, 2025Updated 5 months ago
- Get Windows Process List in Rust☆10May 4, 2022Updated 4 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 5 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 6 months ago
- Hunt for SQLite files used by various applications☆31Mar 1, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- The diary of a n00b in the unfamiliar and terrifying venture into Capture-the-flag.☆12Oct 14, 2018Updated 7 years ago
- Golang C2 Client + PHP API Handler☆14Aug 1, 2023Updated 2 years ago
- ☆12Apr 10, 2021Updated 5 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Privacy Check Go☆25Feb 11, 2026Updated 3 months ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated 2 years ago
- ☆260Jun 7, 2025Updated 11 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 10 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 6 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 8 months ago
- ☆84Feb 4, 2026Updated 3 months ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago