Automating Security Detection Engineering, published by Packt
☆67Oct 12, 2024Updated last year
Alternatives and similar repositories for Automating-Security-Detection-Engineering
Users that are interested in Automating-Security-Detection-Engineering are comparing it to the libraries listed below
Sorting:
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆87Jul 3, 2023Updated 2 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Apr 29, 2024Updated last year
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Feb 22, 2026Updated last week
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 2 weeks ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Configure and deploy AWS GuardDuty.☆11Sep 9, 2025Updated 5 months ago
- Doorkeeper is an OAuth 2 provider for Rails.☆13Jan 7, 2015Updated 11 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆14Mar 27, 2024Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Sep 4, 2024Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆289Feb 5, 2024Updated 2 years ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 weeks ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,138Dec 19, 2025Updated 2 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 8 months ago
- ☆14Jan 2, 2025Updated last year
- ☆34Nov 11, 2025Updated 3 months ago
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Apr 9, 2021Updated 4 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- ☆19Dec 9, 2024Updated last year
- ☆21May 8, 2022Updated 3 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated last month
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- A library of FIPS 140-2 compliant Docker images☆20Jun 2, 2020Updated 5 years ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆758Aug 28, 2025Updated 6 months ago
- R package for working with VERIS data☆25Aug 4, 2023Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆282Mar 20, 2025Updated 11 months ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Feb 23, 2026Updated last week
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆832Updated this week
- Ansible VMware Collection☆36Jan 23, 2026Updated last month
- ☆28Dec 26, 2025Updated 2 months ago
- Collection of example YARA-L rules for use within Google Security Operations☆473Dec 5, 2025Updated 2 months ago