CyberCastle-Blueteam / OpenThreatDetectionRulesView external linksLinks
A collection of open source threat detection rules created by Cyber Castle's team.
☆14Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for OpenThreatDetectionRules
Users that are interested in OpenThreatDetectionRules are comparing it to the libraries listed below
Sorting:
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ☆12Feb 16, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Dec 1, 2025Updated 2 months ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- ☆10Aug 11, 2025Updated 6 months ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A simple client/server app to render widgets defined by a JSON file onto a web browser page.☆10Oct 24, 2023Updated 2 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Updated this week
- ☆11Dec 7, 2025Updated 2 months ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- Processing Traefik logs by splitting them into separate folders based on the "ServiceName" field (e.g., "9-service@http") and implementin…☆16Apr 20, 2025Updated 9 months ago
- ☆13Mar 1, 2024Updated last year
- ☆13Oct 29, 2024Updated last year
- Movie Streaming Platform☆18Updated this week
- Yet another fseventsd parser for macOS forensics☆11Jul 20, 2024Updated last year
- ☆14Jan 21, 2026Updated 3 weeks ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 9 months ago
- Docktor is a Web App that deploys an easy-to-use kit of analysis and scanning tools.☆13Nov 1, 2023Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆13Jan 21, 2021Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- ☆17Dec 18, 2025Updated last month
- ☆15May 3, 2024Updated last year
- ☆10Mar 15, 2017Updated 8 years ago
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 3 years ago