Cyb3rWard0g / floki
Agentic Workflows Made Simple
☆81Updated this week
Alternatives and similar repositories for floki:
Users that are interested in floki are comparing it to the libraries listed below
- Mapping of open-source detection rules and atomic tests.☆87Updated this week
- ☆100Updated 7 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆72Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆24Updated last month
- ☆94Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 6 months ago
- ☆86Updated 4 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆89Updated 11 months ago
- Automation tool for Windows Deception Host Burn-In☆80Updated last month
- Open Threat-Informed Detection Engineering☆28Updated last week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated 2 months ago
- ☆16Updated 2 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆167Updated 4 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆98Updated 3 months ago
- ☆12Updated 8 months ago
- Anvilogic Forge☆88Updated last week
- ☆35Updated last month
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆32Updated last month
- Stupid Simple Detection Testing☆12Updated 10 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆25Updated 4 months ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 6 months ago
- Test case indexes☆37Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆166Updated 2 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 4 months ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆34Updated 2 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆48Updated this week
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆82Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆116Updated 9 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year