☆28Mar 16, 2026Updated last week
Alternatives and similar repositories for Content-Library-CIM2
Users that are interested in Content-Library-CIM2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Oct 18, 2024Updated last year
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- ☆27Aug 15, 2022Updated 3 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆179Dec 2, 2025Updated 3 months ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Updated this week
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- ☆13Sep 10, 2021Updated 4 years ago
- ☆13Jul 11, 2024Updated last year
- IRIS Module to Run Any Velociraptor Artifact☆15Mar 31, 2023Updated 2 years ago
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- ☆11Apr 22, 2022Updated 3 years ago
- ☆56Dec 13, 2025Updated 3 months ago
- A curated list of my GitHub stars!☆17Jan 5, 2025Updated last year
- Repository for the Udemy Course: "Build an Advanced Keylogger using C++ for Ethical Hacking!" with instructor Ermin Kreponic☆13Feb 1, 2018Updated 8 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆96Mar 13, 2026Updated last week
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Lightweight secure AI chat client.☆20Mar 10, 2026Updated last week
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆29Sep 4, 2025Updated 6 months ago
- Kibana visualization that maintains a list of Lucene Queries for easy selection in Dashboards☆11May 5, 2017Updated 8 years ago
- A docker image running both swift and keystone openstack services for TESTING purposes☆13Feb 28, 2019Updated 7 years ago
- Front end (UI) plugin to support security-analytics☆16Mar 13, 2026Updated last week
- Auditing Hooks for https://github.com/jborean93/PSDetour☆13Apr 29, 2025Updated 10 months ago
- ☆15Aug 8, 2017Updated 8 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Mar 17, 2026Updated last week
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- Kibana Relational Filter☆13Sep 2, 2020Updated 5 years ago
- ☆15Jan 27, 2025Updated last year
- ☆43May 22, 2021Updated 4 years ago
- Watcher Horizon plugin. Mirror of code maintained at opendev.org.☆13Updated this week
- Images for use with OpenStack Helm. Mirror of code maintained at opendev.org.☆14Updated this week
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 3 months ago
- Tools for OSINT in Emirates☆25Apr 13, 2025Updated 11 months ago
- Use your terminal shell to do awesome things.☆15Sep 22, 2020Updated 5 years ago