A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concrete examples and real-world bypasses.
☆42Mar 5, 2026Updated 2 weeks ago
Alternatives and similar repositories for Adversarial-Detection-Engineering-Framework
Users that are interested in Adversarial-Detection-Engineering-Framework are comparing it to the libraries listed below
Sorting:
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A Common Lisp library to interface with transmission using its rpc☆13Sep 10, 2025Updated 6 months ago
- visual rich text formatting for plain text files☆15Aug 2, 2020Updated 5 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A libbgpdump Python CFFI wrapper for analyzing MRTv1 and MRTv2 BGP table dump files.☆15Nov 13, 2019Updated 6 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 10 months ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- Brew formula generator for common lisp projects☆21Jul 29, 2024Updated last year
- ☆33Apr 7, 2020Updated 5 years ago
- ☆41Feb 20, 2025Updated last year
- the MicroPython code running on my Watchy☆16Nov 23, 2022Updated 3 years ago
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated 2 years ago
- ☆56Dec 13, 2025Updated 3 months ago
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 5 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Oct 24, 2025Updated 4 months ago
- HyperMap is a new RESTful API standard. Mech is a universal client for HyperMap services.☆27Mar 9, 2026Updated last week
- ☆37Feb 12, 2026Updated last month
- Filesystem interaction via firebeam virtual machine execution☆34Updated this week
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 2 weeks ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated 2 months ago
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 11 months ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- AES-256-CBC: A header-only library for AES encryption and decryption. Securely protect your data with this easy-to-integrate, single-head…☆12May 16, 2024Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84May 2, 2025Updated 10 months ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆86Mar 13, 2026Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Shady vim color-scheme for late night hacking☆24Sep 17, 2025Updated 6 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago