Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).
☆20Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for elsec_dr2an
Users that are interested in elsec_dr2an are comparing it to the libraries listed below
Sorting:
- ☆15Feb 25, 2026Updated last week
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- ☆28Nov 25, 2025Updated 3 months ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Bugs Framework☆10Updated this week
- ☆10Dec 5, 2017Updated 8 years ago
- VLESS-XTLS-uTLS-REALITY setup script.☆10May 3, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- WebUI of MineMeld☆42Mar 16, 2023Updated 2 years ago
- An x86-64 instruction decoder.☆16Mar 11, 2024Updated last year
- ☆11May 3, 2019Updated 6 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Literature Review/ Summary of methods for extraction of causal relations from text☆10Oct 6, 2021Updated 4 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Scripts and ideas shared with the community.☆14Feb 27, 2026Updated last week
- ☆14Sep 28, 2023Updated 2 years ago
- create concept map from textbook data☆11May 4, 2018Updated 7 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- The hub for all JATS4R meeting notes, examples, draft recommendations, documents, and issues.☆17Sep 8, 2019Updated 6 years ago
- Repository for integration with Apache Kafka☆14Jul 22, 2022Updated 3 years ago
- ☆10Jul 8, 2015Updated 10 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- ☆10May 6, 2023Updated 2 years ago
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- 由于官网的教程写得比较复杂,所以笔者写一个简单的例子☆10Jul 18, 2023Updated 2 years ago