A collection of open source threat detection rules created by Cyber Castle's team.
☆14Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for OpenThreatDetectionRules
Users that are interested in OpenThreatDetectionRules are comparing it to the libraries listed below
Sorting:
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 7 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Movie Streaming Platform☆18Feb 24, 2026Updated last week
- ☆13Mar 1, 2024Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 3 weeks ago
- ☆15Sep 4, 2020Updated 5 years ago
- Anvilogic Forge☆116Sep 18, 2025Updated 5 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- Processing Traefik logs by splitting them into separate folders based on the "ServiceName" field (e.g., "9-service@http") and implementin…☆16Apr 20, 2025Updated 10 months ago
- ☆11Dec 7, 2025Updated 3 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- A minimal SOCKS5 proxy written in C.☆12Mar 8, 2021Updated 5 years ago
- ☆14Updated this week
- wiringX for Milk-V Duo☆11Sep 24, 2024Updated last year
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Jul 7, 2021Updated 4 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆13Jan 21, 2021Updated 5 years ago
- ☆15May 3, 2024Updated last year
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- Docktor is a Web App that deploys an easy-to-use kit of analysis and scanning tools.☆13Nov 1, 2023Updated 2 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- ☆17Dec 18, 2025Updated 2 months ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- Quickly see python imports in terminal in a tree view☆11Aug 8, 2024Updated last year