A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concrete examples and real-world bypasses.
☆48Mar 5, 2026Updated last month
Alternatives and similar repositories for Adversarial-Detection-Engineering-Framework
Users that are interested in Adversarial-Detection-Engineering-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆76Mar 15, 2026Updated last month
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆21Jul 21, 2025Updated 9 months ago
- ☆12Feb 15, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A libbgpdump Python CFFI wrapper for analyzing MRTv1 and MRTv2 BGP table dump files.☆15Nov 13, 2019Updated 6 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- Comprehensive Cheat Sheet for Rapid7's Insight-IDR LEQL Search Language.☆11Mar 18, 2024Updated 2 years ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- ☆41Feb 20, 2025Updated last year
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated 2 years ago
- ☆55Dec 13, 2025Updated 4 months ago
- Find jmp gadgets for call stack spoofing.☆82Oct 1, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆23Sep 6, 2025Updated 7 months ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Apr 2, 2026Updated 3 weeks ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 11 years ago
- ☆43Feb 12, 2026Updated 2 months ago
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated last month
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated last month
- Impacket pre-compiled binaries☆19Jul 31, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆10Dec 28, 2015Updated 10 years ago
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆27Mar 18, 2026Updated last month
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- Local CLI tool for browser extension risk analysis☆29Apr 11, 2025Updated last year
- Personal Hidden Git Server☆25Aug 28, 2022Updated 3 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- AES-256-CBC: A header-only library for AES encryption and decryption. Securely protect your data with this easy-to-integrate, single-head…☆12May 16, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆85May 2, 2025Updated 11 months ago
- Drop a single binary into a compromised Kubernetes pod and instantly map every realistic attack path to cluster-admin, node escape, sec…☆134Apr 23, 2026Updated last week
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago